2022 1st International Conference on Computational Science and Technology (ICCST) 2022
DOI: 10.1109/iccst55948.2022.10040411
|View full text |Cite
|
Sign up to set email alerts
|

Digital Healthcare using Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…A crucial element in our system is the use of hash locks, particularly when connecting to an EHR from an external system. For instance, if a stakeholder from System B requires access to a patient's EHR in System A, a hash lock is created for that specific EHR, as outlined in study [18]. This hash lock grants the stakeholder in System B access to the patient's EHR, facilitating information retrieval.…”
Section: Methodsmentioning
confidence: 99%
“…A crucial element in our system is the use of hash locks, particularly when connecting to an EHR from an external system. For instance, if a stakeholder from System B requires access to a patient's EHR in System A, a hash lock is created for that specific EHR, as outlined in study [18]. This hash lock grants the stakeholder in System B access to the patient's EHR, facilitating information retrieval.…”
Section: Methodsmentioning
confidence: 99%
“…The integration of electronic health records and telemedicine introduces a wealth of sensitive patient data, making it crucial to secure health information from unauthorized access, data breaches, and identity theft [20]. The blockchain implementation by the healthcare companies [21] to gather comprehensive patient records, including sensitive data like social security numbers, making it crucial to secure health information from unauthorized access and data breaches.…”
Section: Digital Health Data Securitymentioning
confidence: 99%
“…Brenda, et al (2022) Data breaches, malware, viruses, legacy systems, and network security risks. Ramar et al (2022).…”
Section: Regulatory Requirements and Legal Uncertaintiesmentioning
confidence: 99%