2003
DOI: 10.3233/thc-2003-11106
|View full text |Cite
|
Sign up to set email alerts
|

Enriching healthcare applications with cryptographic mechanisms and XML- based security services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2022
2022
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 1 publication
0
5
0
1
Order By: Relevance
“…The results of the study showed that in some countries there are still no minimum requirements and standards for these systems [2,4,6]. However, the use of security and privacy protocols has been used in various ways [3,[7][8][9]. In general, security in an electronic health care system includes the seven main components of user authentication, patient confidentiality, licensing issues, scalability, integrity, non-denial, and confidentiality of information sent, processed, and stored.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The results of the study showed that in some countries there are still no minimum requirements and standards for these systems [2,4,6]. However, the use of security and privacy protocols has been used in various ways [3,[7][8][9]. In general, security in an electronic health care system includes the seven main components of user authentication, patient confidentiality, licensing issues, scalability, integrity, non-denial, and confidentiality of information sent, processed, and stored.…”
Section: Resultsmentioning
confidence: 99%
“…There is a lot of cost involved in this. Encryption techniques allow confidential data to be transmitted over public networks such as the Internet, provided the encryption mechanism is strong enough to prevent unauthorized disclosure [1,3,4,10,12,13].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Η υποστήριξη ενός ασφαλούς περιβάλλοντος επέβαλε την ανάπτυξη και τελικώς την υιοθέτηση προτύπων και προδιαγραφών όπως είναι η Κρυπτογράφηση XML [Naedele], οι Προηγμένες XML Ψηφιακές Υπογραφές (XAdES) [ETSI101733, XAdES02] και η Ασφάλεια Υπηρεσιών Ιστού [Hartman03] οι οποίες προσφέρουν το απαιτούμενο επίπεδο ασφάλειας στα σύγχρονα πληροφοριακά συστήματα. Αξιοσημείωτα παραδείγματα τέτοιου είδους συστημάτων συναντώνται σε πολλούς τομείς του σύγχρονου ψηφιακού κόσμου όπως είναι στο ηλεκτρονικό/κινητό-εμπόριο [Polemi06a,Polemi06b], στην η/κ-διακυβέρνηση [Karantjias07a, Papastergiou08a, Kaliontzoglou06a, Kaliontzoglou06b] και στην η/κ-υγεία [Bourka03a,Bourka03b,Georgoulas03]. Η πολυπλοκότητα των συγκεκριμένων λύσεων ποικίλει και είναι άμεση συνάρτηση της πολυπλοκότητας των υιοθετημένων επιχειρησιακών διαδικασιών και της προσφερόμενης λειτουργικότητας.…”
Section: ευχαριστίεςunclassified