Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Security technologies for the World Wide Web
Security technologies for the World Wide Web
Internet and Intranet Security
Internet and Intranet Security
Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption
Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption
A PC Cryptographic Coprocessor based on TI Signal Processor and Smart Card System
Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues of the New Century
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
Hi-index | 0.00 |
This paper is devoted to e-healthcare security systems based on modern security mechanisms and Public Key Infrastructure (PKI) systems. We signified that only general and multi-layered security infrastructure could cope with possible attacks to e-healthcare systems. We evaluated security mechanisms on application, transport and network layers of ISO/OSI reference model. These mechanisms include confidentiality protection based on symmetrical cryptographic algorithms and digital signature technology based on asymmetrical algorithms for authentication, integrity protection and non-repudiation. User strong authentication procedures based on smart cards, digital certificates and PKI systems are especially emphasized. We gave a brief description of smart cards, HSMs and main components of the PKI systems, emphasizing Certification Authority and its role in establishing cryptographically unique identities of the valid system users based on X.509 digital certificates. Emerging e-healthcare systems and possible appropriate security mechanisms based on proposed Generic CA model are analyzed.