2010
DOI: 10.1016/j.csi.2009.04.005
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
40
0
1

Year Published

2010
2010
2022
2022

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 99 publications
(43 citation statements)
references
References 6 publications
0
40
0
1
Order By: Relevance
“…In [7], the authors present a hybrid public key infrastructure solution to comply with the HIPAA (Health Insurance Portability and Accountability Act) privacy and security regulations in systems supporting Internet-enabled healthcare applications. The proposed schema is contact based instead of adopting conventional session based cryptographic key management.…”
Section: Related Workmentioning
confidence: 99%
“…In [7], the authors present a hybrid public key infrastructure solution to comply with the HIPAA (Health Insurance Portability and Accountability Act) privacy and security regulations in systems supporting Internet-enabled healthcare applications. The proposed schema is contact based instead of adopting conventional session based cryptographic key management.…”
Section: Related Workmentioning
confidence: 99%
“…The protection of personal information is a concern (Hoang et al, 2009;Hu and Han, 2009;Hu et al, 2010). The emergence of biometric security technology resolved this problem to some extent.…”
Section: Introductionmentioning
confidence: 99%
“…However, if the protected data is indeed transmitted, it should be protected through cryptographic techniques and A should attain access to the decryption key only in case of (auditable) overrides. One solution that is used by many architectures is to put in place a central key distribution server infrastructure, e.g., (Hu et al 2010;Anciaux et al 2008). In this case, S2 would encrypt the protected parts of X's medical record prior to sending it to A and then deposit the decryption key at a central key server.…”
Section: Introductionmentioning
confidence: 99%