Proceedings. 6th International Workshop on Enterprise Networking and Computing in Healthcare Industry - Healthcom 2004 (IEEE Ca
DOI: 10.1109/health.2004.1324458
|View full text |Cite
|
Sign up to set email alerts
|

Maintaining security in an ontology driven multi-agent system for electronic health records

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…However, the issue of security by keeping the patient's medical and billing information private and confidential to only those who should have authorized access to view it has become a topic of concern [7]. The focus of this paper is to introduce a method of providing secure authorization and authentication of EMRs between rural hospital networks.…”
Section: Emr Exchangementioning
confidence: 99%
See 2 more Smart Citations
“…However, the issue of security by keeping the patient's medical and billing information private and confidential to only those who should have authorized access to view it has become a topic of concern [7]. The focus of this paper is to introduce a method of providing secure authorization and authentication of EMRs between rural hospital networks.…”
Section: Emr Exchangementioning
confidence: 99%
“…There has been considerable research in the exchange of EMRs within a healthcare infrastructure [7][8][9], along with the framework in developing this type of architecture [8][9][10]. These investigations stem from organizing the framework of healthcare networks to allow for secure transfer of EMRs [7,[10][11][12] to the specific detail in creating an HL7 web-based application to view the patient's medical and billing information [3].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The importance of security in the healthcare domain has also been recognised in [6], particularly for managing patient data and its communication in a distributed environment. Security tags are used to mark information with regard to privacy within the patient record structure so that access is restricted to trusted agents only.…”
Section: Figure 1 the Rbac Modelmentioning
confidence: 99%