A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking
Journal of Medical Systems
Novel methods of faster cardiovascular diagnosis in wireless telecardiology
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
Computer Standards & Interfaces
Monitoring patients via a secure and mobile healthcare system
IEEE Wireless Communications
Privacy preserving EHR system using attribute-based infrastructure
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
Efficient key management for preserving HIPAA regulations
Journal of Systems and Software
Data-centric privacy protocol for intensive care grids
IEEE Transactions on Information Technology in Biomedicine
A More Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
A Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Privacy Challenges in the Use of eHealth Systems for Public Health Management
International Journal of E-Health and Medical Communications
Journal of Medical Systems
A HIPAA-compliant key management scheme with revocation of authorization
Computer Methods and Programs in Biomedicine
Hi-index | 0.00 |
The Health Insurance Portability and Accountability Act (HIPAA) privacy and security regulations are two crucial provisions in the protection of healthcare privacy. Privacy regulations create a principle to assure that patients have more control over their health information and set limits on the use and disclosure of health information. The security regulations stipulate the provisions implemented to guard data integrity, confidentiality, and availability. Undoubtedly, the cryptographic mechanisms are well defined to provide suitable solutions. In this paper, to comply with the HIPAA regulations, a flexible cryptographic key management solution is proposed to facilitate interoperations among the applied cryptographic mechanisms. In addition, case of consent exceptions intended to facilitate emergency applications and other possible exceptions can also be handled easily.