XrML -- eXtensible rights Markup Language
Proceedings of the 2002 ACM workshop on XML security
Hacking Exposed: Network Security Secrets and Solutions, Fourth Edition
Hacking Exposed: Network Security Secrets and Solutions, Fourth Edition
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
CSFW '04 Proceedings of the 17th IEEE workshop on Computer Security Foundations
Sensor Networks for Emergency Response: Challenges and Opportunities
IEEE Pervasive Computing
A Trust Management Model for Virtual Communities
CIT '05 Proceedings of the The Fifth International Conference on Computer and Information Technology
Security issues of wireless sensor networks in healthcare applications
BT Technology Journal
Design and Semantics of a Decentralized Authorization Language
CSF '07 Proceedings of the 20th IEEE Computer Security Foundations Symposium
Computer
Protecting privacy during on-line trust negotiation
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
A framework for health care information assurance policy and compliance
Communications of the ACM
Hi-index | 0.02 |
The main purpose of a virtual healthcare community is to enforce members' collaboration and allow them collectively conduct health care activities. Patient monitoring and medical consultation and support are the most popular activities inside health care communities. They bring together medical experts and patients and require confidentiality, reliability and trust in order to be successful. An examination of existing virtual communities for healthcare leads to the conclusion that many of them fail to meet requirements for building trust. Several ethical, legal and technical issues must be considered in order to build a trustful community. This work presents the architecture of a virtual healthcare community portal with emphasis on the issues that help building trust inside the community. With a set of hypothetical usage scenarios that challenge trust in the community we uncover healthcare community's pitfalls and illustrate the solutions provided by the proposed architecture.