4th International IEEE EMBS Special Topic Conference on Information Technology Applications in Biomedicine, 2003.
DOI: 10.1109/itab.2003.1222488
|View full text |Cite
|
Sign up to set email alerts
|

A secure identification access control scheme for accessing healthcare information systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
2

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 10 publications
0
7
0
2
Order By: Relevance
“…12,13 In our implementation, the identity server is a mobile device accredited by the user. A common solution in literature is to establish an identity service on a trusted server.…”
Section: Cryptographic Primitives and Algorithms Used For Access Controlmentioning
confidence: 99%
See 2 more Smart Citations
“…12,13 In our implementation, the identity server is a mobile device accredited by the user. A common solution in literature is to establish an identity service on a trusted server.…”
Section: Cryptographic Primitives and Algorithms Used For Access Controlmentioning
confidence: 99%
“…A common solution in literature is to establish an identity service on a trusted server. 12,13 In our implementation, the identity server is a mobile device accredited by the user. Therefore, there must always be at least one device accredited for each user.…”
Section: Two-factor Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…This paper will look into automating the software testing phase ofthe SDLC and will demonstrate how Workflows can be applied to automate the testing process [19]. In addition, an extensive analysis was performed in the area of healthcare to understand the feasibility of use [3], [10], [15], [16], [17].…”
Section: Workflow Management Systemmentioning
confidence: 99%
“…Information communication technology has brought about an explosive increase in digital information. As medical record management takes charge of vital information transferred among doctors, nurses, and involved participants in different departments, how to enhance the security of electronic medical records has become an essential challenge in the medical treatment process [1][2][3].…”
Section: Introductionmentioning
confidence: 99%