A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
The CLEF Chronicle: Patient Histories Derived from Electronic Health Records
ICDEW '06 Proceedings of the 22nd International Conference on Data Engineering Workshops
Pseudonymization for improving the Privacy in E-Health Applications
HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
Privacy-Preserving Recommendation Systems for Consumer Healthcare Services
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Strategies for health data exchange for secondary, cross-institutional clinical research
Computer Methods and Programs in Biomedicine
Support Access to Distributed EPRs with Three Levels of Identity Privacy Preservation
ARES '11 Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security
Unique user-generated digital pseudonyms
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
A smart-card-enabled privacy preserving E-prescription system
IEEE Transactions on Information Technology in Biomedicine
Hi-index | 0.00 |
The emergence of e-health has put an enormous amount of sensitive data in the hands of service providers or other third parties, where privacy risks might exist when accessing sensitive data stored in electronic patient records (EPRs). EPRs support efficient access to patient data by healthcare providers and third party users, which will consequently improve patient care. However, uncontrolled access to distributed EPRs can introduce serious concerns related to patient privacy. This indicates that there is a need for a stronger fine-grained access control mechanism to be used in e-health applications. This paper, therefore, presents a novel method to support access to distributed EPRs with three levels of patient identity privacy preservation. The method offers a number of significant features: (1) it makes use of credentials to support the three-levels of accesses; (2) it simplifies key management distribution; (3) it allows better performance; (4) it supports separation of duties among trusted third parties (ensuring accountability); (5) it improves scalability. The method makes use of cryptographic primitives. In comparison with related work, the method supports three levels of access requirements while preserving data owner's privacy on a single platform.