2014
DOI: 10.1007/978-3-319-05693-7_13
|View full text |Cite
|
Sign up to set email alerts
|

A Model of Privacy and Security for Electronic Health Records

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 10 publications
0
4
0
1
Order By: Relevance
“…This framework proposes to detect unauthorized user access to the patient's health records by following the privacy by design principles. Multi-authority-based access control is suggested by this study to defend unauthorized access of patient's personal data as the administrator of the system can misuse them while accessing the system and patients' health records are often exposed to third parties for healthcare purposes [30,44]. Accordingly, the sensitive data should be retrieved by the doctor's consent or in some cases by the patient's consent to overcome this problem.…”
Section: Relevant Studiesmentioning
confidence: 99%
“…This framework proposes to detect unauthorized user access to the patient's health records by following the privacy by design principles. Multi-authority-based access control is suggested by this study to defend unauthorized access of patient's personal data as the administrator of the system can misuse them while accessing the system and patients' health records are often exposed to third parties for healthcare purposes [30,44]. Accordingly, the sensitive data should be retrieved by the doctor's consent or in some cases by the patient's consent to overcome this problem.…”
Section: Relevant Studiesmentioning
confidence: 99%
“…Recent papers tackled such challenges. For example, in the papers (Fernández-Alemán et al 2013) and (Mehndiratta et al 2014), the authors present the difficulties of providing security and privacy in EHR systems.…”
Section: Identification Of Relevant Studiesmentioning
confidence: 99%
“…Moreover, outsider attack, such as man-in-the-middle attack or eavesdropping denial of services, is managed efficiently in this encryption method. There are both positive and negative impacts through the analysis of SPSS [75]. In this framework, there is a feeble relationship between privacy and negative impact, for example, patient information can be accessed by the administrator for stealing data [76].…”
Section: Enhanced E-health Framework For Privacy In the Healthcare Symentioning
confidence: 99%