[HTML][HTML] Security and privacy in electronic health records: A systematic literature review

JL Fernández-Alemán, IC Señor, PÁO Lozoya… - Journal of biomedical …, 2013 - Elsevier
OBJECTIVE: To report the results of a systematic literature review concerning the security
and privacy of electronic health record (EHR) systems. DATA SOURCES: Original articles …

[HTML][HTML] Security and privacy issues in e-health cloud-based system: A comprehensive content analysis

NA Azeez, C Van der Vyver - Egyptian Informatics Journal, 2019 - Elsevier
The recent advancement in Information and Communication Technology (ICT) has
undoubtedly improved services in all sectors in the world. Specifically, Information …

Situational access control in the internet of things

R Schuster, V Shmatikov, E Tromer - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Access control in the Internet of Things (IoT) often depends on a situation---for example," the
user is at home''---that can only be tracked using multiple devices. In contrast to the (well …

Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities

T Kanwal, A Anjum, A Khan - Cluster Computing, 2021 - Springer
Electronic health records (EHRs) are increasingly employed to maintain, store and share
varied types of patient data. The data can also be utilized for various research purposes …

Privacy-preserving attribute-based access control model for XML-based electronic health record system

K Seol, YG Kim, E Lee, YD Seo, DK Baik - IEEE Access, 2018 - ieeexplore.ieee.org
Cloud-based electronic health record (EHR) systems enable medical documents to be
exchanged between medical institutions; this is expected to contribute to improvements in …

Biomedical data privacy: problems, perspectives, and recent advances

BA Malin, KE Emam, CM O'Keefe - Journal of the American …, 2013 - academic.oup.com
The notion of privacy in the healthcare domain is at least as old as the ancient Greeks.
Several decades ago, as electronic medical record (EMR) systems began to take hold, the …

[HTML][HTML] AC-ABAC: Attribute-based access control for electronic medical records during acute care

MT de Oliveira, Y Verginadis, LHA Reis… - Expert Systems with …, 2023 - Elsevier
Acute care demands fast response and procedures from the healthcare professionals
involved in the emergency. The availability of electronic medical records (EMR) enables …

ECA: An edge computing architecture for privacy-preserving in IoT-based smart city

M Gheisari, QV Pham, M Alazab, X Zhang… - IEEE …, 2019 - ieeexplore.ieee.org
Recently, IoT has greatly influenced our daily lives through various applications. One of the
most promising application is smart city that leverages IoT devices to manage cities without …

Using statistical and machine learning to help institutions detect suspicious access to electronic health records

AA Boxwala, J Kim, JM Grillo… - Journal of the …, 2011 - academic.oup.com
Objective To determine whether statistical and machine-learning methods, when applied to
electronic health record (EHR) access data, could help identify suspicious (ie, potentially …

Detecting anomalous insiders in collaborative information systems

Y Chen, S Nyemba, B Malin - IEEE transactions on dependable …, 2012 - ieeexplore.ieee.org
Collaborative information systems (CISs) are deployed within a diverse array of
environments that manage sensitive information. Current security mechanisms detect insider …