VLSI Architectures for Computing Multiplications and Inverses in GF(2m)
IEEE Transactions on Computers
Communications of the ACM
Smart Card Crypto-Coprocessors for Public-Key Cryptography
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
Using Healthcare IC Cards to manage the drug doses of chronic disease patients
Computers in Biology and Medicine
Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
Computer Standards & Interfaces
Efficient key management for preserving HIPAA regulations
Journal of Systems and Software
Computer Methods and Programs in Biomedicine
A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations
IEEE Transactions on Information Technology in Biomedicine
New directions in cryptography
IEEE Transactions on Information Theory
A Novel Key Management Solution for Reinforcing Compliance With HIPAA Privacy/Security Regulations
IEEE Transactions on Information Technology in Biomedicine
Computer Methods and Programs in Biomedicine
Computer Methods and Programs in Biomedicine
Computer Methods and Programs in Biomedicine
Privacy-preserving Kruskal-Wallis test
Computer Methods and Programs in Biomedicine
Hi-index | 0.00 |
Patient control over electronic protected health information (ePHI) is one of the major concerns in the Health Insurance and Accountability Act (HIPAA). In this paper, a new key management scheme is proposed to facilitate control by providing two functionalities. First, a patient can authorize more than one healthcare institute within a designated time period to access his or her ePHIs. Second, a patient can revoke authorization and add new authorized institutes at any time as necessary. In the design, it is not required to re-encrypt ePHIs for adding and revoking authorizations, and the implementation is time- and cost-efficient. Consent exception is also considered by the proposed scheme.