A secure EHR system based on hybrid clouds

YY Chen, JC Lu, JK Jan - Journal of medical systems, 2012 - Springer
Consequently, application services rendering remote medical services and electronic health
record (EHR) have become a hot topic and stimulating increased interest in studying this …

Patient-controlled mechanism using pseudonymization technique for ensuring the security and privacy of electronic health records

BK Rai - International Journal of Reliable and Quality E …, 2022 - igi-global.com
Abstract An Internet-based Electronic Health Record (EHR) system allows patients to access
their medical history whenever they need it. Access to patient records and transactions …

Security of electronic personal health information in a public hospital in South Africa

KG Chuma, M Ngoepe - Information Security Journal: A Global …, 2022 - Taylor & Francis
Digital health technologies have changed the healthcare sector landscape and thus
generated new opportunities for collecting, storing and accessing electronic personal health …

Security privacy and policy for cryptographic based electronic medical information system

HY Chen, ZY Wu, TL Chen, YM Huang, CH Liu - Sensors, 2021 - mdpi.com
With the development of the internet, applications have become complicated, and the
relevant technology has diversified. Compared with medical applications, the significance of …

[PDF][PDF] Security, privacy, and confidentiality in electronic prescribing systems: A review study

RN Aval, SFM Baigi, M Sarbaz… - Frontiers in Health …, 2022 - researchgate.net
Results: In general, the results of the study showed that in some countries, there are still no
minimum requirements and standards for these systems; But the use of security and privacy …

[PDF][PDF] Augmenting security for electronic patient health record (ePHR) monitoring system using cryptographic key management schemes

AA Elngar, KM Sagayam, AA Elngar… - Fusion: Practice and …, 2021 - researchgate.net
Security plays a major role in most of the fields including pharmaceutical field. Authorization
and Authentication are the key concepts in supporting notable areas of the cyber-health …

Automation in hospitals and health care

A Ugajin - Springer Handbook of Automation, 2023 - Springer
We are sure that patient-centric health care is required for improving quality of life (QoL). To
realize patient-centric health care, the burden and workload of doctors, nurses, and …

A password-based user authentication scheme for the integrated EPR information system

ZY Wu, Y Chung, F Lai, TS Chen - Journal of medical systems, 2012 - Springer
With the rapid development of the Internet, digitization and electronic orientation are
required in various applications of our daily life. For e-medicine, establishing Electronic …

[PDF][PDF] Security and privacy issues in healthcare information system

BK Rai, AK Srivastava - Int. J. Emerg. Trends Technol. Comput. Sci, 2014 - researchgate.net
In last decade, information technology has played a major role in the field of healthcare.
Many countries have introduced rules and regulations for the standardization of technology …

Security solutions for pervasive healthcare

K Venkatasubramanian, SKS Gupta - Security in Distributed, Grid …, 2007 - taylorfrancis.com
Pervasive healthcare systems use pervasive computing technologies, eg, wearable medical
sensors with wireless interconnects, to increase the modalities and spatiotemporal …