Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Journal of Medical Systems
Information Security: Principles and Practice
Information Security: Principles and Practice
Privacy implications for single sign-on authentication in a hospital environment
Proceedings of the 3rd symposium on Usable privacy and security
Fingerprint verification on medical image reporting system
Computer Methods and Programs in Biomedicine
Security and privacy system architecture for an e-hospital environment
Proceedings of the 7th symposium on Identity and trust on the Internet
Understanding user perspectives on biometric technology
Communications of the ACM - Enterprise information integration: and other tools for merging data
Designing Fingerprint-Recognition-Based Access Control for Electronic Medical Records Systems
AINAW '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops
Traceable and retrievable identity-based encryption
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Privacy practices in collaborative environments: a study of emergency department staff
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing
Hi-index | 0.00 |
Securing electronic health records, in scenarios in which the provision of care services is share among multiple actors, could become a complex and costly activity. Correct identification of patients and physician, protection of privacy and confidentiality, assignment of access permissions for healthcare providers and resolutions of conflicts rise as main points of concern in the development of interconnected health information networks. Biometric technologies have been proposed as a possible technological solution for these issues due to its ability to provide a mechanism for unique verification of an individual identity. This paper presents an analysis of the benefit as well as disadvantages offered by biometric technology. A comparison between this technology and more traditional identification methods is used to determine the key benefits and flaws of the use biometric in health information systems. The comparison as been made considering the viability of the technologies for medical environments, global security needs, the contemplation of a share care environment and the costs involved in the implementation and maintenance of such technologies. This paper also discusses alternative uses for biometrics technologies in health care environments. The outcome of this analysis lays in the fact that even when biometric technologies offer several advantages over traditional method of identification, they are still in the early stages of providing a suitable solution for a health care environment.