Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure
ACM Transactions on Information and System Security (TISSEC)
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
From Template to Image: Reconstructing Fingerprints from Minutiae Points
IEEE Transactions on Pattern Analysis and Machine Intelligence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Hardware-rooted trust for secure key management and transient trust
Proceedings of the 14th ACM conference on Computer and communications security
Engineering a Policy-Based System for Federated Healthcare Databases
IEEE Transactions on Knowledge and Data Engineering
A pixel-based scrambling scheme for digital medical images protection
Journal of Network and Computer Applications
A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations
IEEE Transactions on Information Technology in Biomedicine
Privacy preserving EHR system using attribute-based infrastructure
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
A mutual-healing key distribution scheme in wireless sensor networks
Journal of Network and Computer Applications
Efficient key management for preserving HIPAA regulations
Journal of Systems and Software
Medical image security and EPR hiding using Shamir's secret sharing scheme
Journal of Systems and Software
Protecting privacy during peer-to-peer exchange of medical documents
Information Systems Frontiers
Forward Secure Digital Signature for Electronic Medical Records
Journal of Medical Systems
PKI Security in Large-Scale Healthcare Networks
Journal of Medical Systems
A Secure EHR System Based on Hybrid Clouds
Journal of Medical Systems
Privacy practices in collaborative environments: a study of emergency department staff
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing
A HIPAA-compliant key management scheme with revocation of authorization
Computer Methods and Programs in Biomedicine
Robust Smart Card Authentication Scheme for Multi-server Architecture
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
The Health Insurance Portability and Accountability Act (HIPAA) has set privacy and security regulations for the US healthcare industry. HIPAA has also established principles for security standards that global e-health industry tends to follow. In this paper, a hybrid public key infrastructure solution (HPKI) is proposed to comply with the HIPAA regulations. The main contribution is the new e-health security architecture that is contract oriented instead of session oriented which exists in most literatures. The proposed HPKI has delegated the trust and security management to the medical service provider during the contract period, which is more realistic. It is much an analogy to existing paper based health care systems in terms of functional structure. The cryptographically strong PKI scheme is deployed for the mutual authentication and the distribution of sensitive yet computational non-intensive data while efficient symmetric cryptographic technology is used for the storage and transmission of high volume of medical data such as medical images. One advantage is that the proposed HPKI can be constructed from existing cryptographic technologies where various relevant security standards, tools and products are available. Discussion has been provided to illustrate how proposed schemes can address the HIPAA privacy and security regulations.