Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Cross-Platform Integration with XML and SOAP
IT Professional
Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI
IEEE Internet Computing
Why Textbook ElGamal and RSA Encryption Are Insecure
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Fulfilling the Web services promise
Communications of the ACM - E-services: a cornucopia of digital offerings ushers in the next Net-based evolution
Integrated Design of AES (Advanced Encryption Standard) Encrypter and Decrypter
ASAP '02 Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures, and Processors
Investigating the Limits of SOAP Performance for Scientific Computing
HPDC '02 Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing
A SOAP-Oriented Component-Based Framework Supporting Device-Independent Multimedia Web Services
MSE '02 Proceedings of the Fourth IEEE International Symposium on Multimedia Software Engineering
Yaksha: augmenting Kerberos with public key cryptography
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Migrating to Web Services " Latency and Scalability
WSE '02 Proceedings of the Fourth International Workshop on Web Site Evolution (WSE'02)
Active Certificates: A New Paradigm in Digital Certificate Management
ICPPW '02 Proceedings of the 2002 International Conference on Parallel Processing Workshops
J2ME application-layer end-to-end security for m-commerce
Journal of Network and Computer Applications
Statistical testing of web applications
Journal of Software Maintenance and Evolution: Research and Practice - Special issue: Web site evolution
An HMAC processor with integrated SHA-1 and MD5 algorithms
Proceedings of the 2004 Asia and South Pacific Design Automation Conference
Authorization and Privacy for Semantic Web Services
IEEE Intelligent Systems
A 2-Layer Model for the White-Box Testing of Web Applications
WSE '04 Proceedings of the Web Site Evolution, Sixth IEEE International Workshop
High-speed VLSI architectures for the AES algorithm
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Compression of XML Physiological Data Streams to Support Neonatal Intensive Care Unit Web Services
EEE '05 Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'05) on e-Technology, e-Commerce and e-Service
Using qualitative studies to improve the usability of an EMR
Journal of Biomedical Informatics - Special issue: Human-centered computing in health information systems. Part 1: Analysis and design
Indexing XML data stored in a relational database
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
PE-ICE: Parallelized Encryption and Integrity Checking Engine
DDECS '06 Proceedings of the 2006 IEEE Design and Diagnostics of Electronic Circuits and systems
Situation-Based Access Control: Privacy management via modeling of patient data access scenarios
Journal of Biomedical Informatics
Utilize Common Criteria Methodology for Secure Ubiquitous Healthcare Environment
Journal of Medical Systems
A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety
Journal of Medical Systems
Journal of Medical Systems
Secure Communication of Medical Information Using Mobile Agents
Journal of Medical Systems
A Security and Privacy Preserving E-Prescription System Based on Smart Cards
Journal of Medical Systems
A robust and simple security extension for the medical standard SCP-ECG
Journal of Biomedical Informatics
An Authentication Scheme for Secure Access to Healthcare Services
Journal of Medical Systems
Hi-index | 0.00 |
This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.