2022
DOI: 10.3390/app12115701
|View full text |Cite
|
Sign up to set email alerts
|

Extended Chaotic-Map-Based User Authentication and Key Agreement for HIPAA Privacy/Security Regulations

Abstract: Background: The US government has enacted the Health Insurance Portability and Accountability Act (HIPAA), in which patient control over electronic protected health information is a major issue of concern. The two main goals of the Act are the privacy and security regulations in the HIPAA and the availability and confidentiality of electronic protected health information. The most recent authenticated key-agreement schemes for HIPAA privacy/security have been developed using time-consuming modular exponential … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…Furthermore, the ethical aspects are also important. This relevance is suggested not only by significant regulations, such as the European GDPR [ 33 ], or the American HIPAA [ 76 , 77 ], but also by direct research and practical experience. Thus, even if the data are collected through a legitimate process, the generated results may be influenced by inadvertent data alteration factors.…”
Section: Analytical Discussion Concerning Relevant Research Aspects A...mentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, the ethical aspects are also important. This relevance is suggested not only by significant regulations, such as the European GDPR [ 33 ], or the American HIPAA [ 76 , 77 ], but also by direct research and practical experience. Thus, even if the data are collected through a legitimate process, the generated results may be influenced by inadvertent data alteration factors.…”
Section: Analytical Discussion Concerning Relevant Research Aspects A...mentioning
confidence: 99%
“…The authors also describe the general features of a technical standard, which may define an e-Health system. The paper also includes a taxonomy of cloud-based models, while the relevant personal data privacy and security requirements enforced by the Health Insurance Portability and Accountability Act (HIPAA) [ 76 , 77 ] are analyzed. It is important to note that the authors describe a secure and dependable system architecture, which is compatible with electronic health scenarios that could guarantee efficiency, reliability, and a properly regulated access framework to health information.…”
Section: Data Acquisition Through Mobile Devices and Sensorsmentioning
confidence: 99%