2015 20th International Conference on Control Systems and Computer Science 2015
DOI: 10.1109/cscs.2015.76
|View full text |Cite
|
Sign up to set email alerts
|

Managing the Privacy and Security of eHealth Data

Abstract: The large scale adoption of mobile medicine, supported by an increasing number of medical devices and remote access to health services, correlated with the continuous involvement of the patients in their own healthcare, led to the emergence of tremendous amounts of clinical data. They need to be securely transferred, archived and accessed. This paper refers to a new approach for protecting the privacy and security of clinical data through the use of a state of the art encryption scheme and attribute-based acce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…20 Social reference (SR) and facilitating condition were adopted from UTAUT. 22 The model also incorporates a few additional variables based on existing literature and empirical evidences to have a better understanding of consumers' acceptance behavior toward e-health, which are perceived cost (PC), 30 perceived privacy (PP), 31 service delivery time (SDT), 32 perceived system effectiveness (PSE), 33 and impact of advertisement (Adv). 34…”
Section: Research Framework and Hypothesismentioning
confidence: 99%
“…20 Social reference (SR) and facilitating condition were adopted from UTAUT. 22 The model also incorporates a few additional variables based on existing literature and empirical evidences to have a better understanding of consumers' acceptance behavior toward e-health, which are perceived cost (PC), 30 perceived privacy (PP), 31 service delivery time (SDT), 32 perceived system effectiveness (PSE), 33 and impact of advertisement (Adv). 34…”
Section: Research Framework and Hypothesismentioning
confidence: 99%
“…In this section, the authors aim at analyzing the founding research objectives (RO), together with the methodology followed to reach them. As already described in the previous section, the need to establish practical demonstrators capable of supporting theoretical lectures about the DT paradigm in Learning Factories, is of crucial importance as the digitalization processes in industrial settings require highly specialized workforce and knowledgeable experts in Information Technology-related topics, such as IoT, communication protocols, network infrastructures, and cybersecurity [18]. For these reasons, the research objectives posed in this work are the following:…”
Section: Research Objectives and Methodologymentioning
confidence: 99%
“…Currently, the issue of privacy breach of personal data has become the core concern of big data in health care [17,18]. Soceanu et al [19] proposed a new privacy protection approach for healthcare big data to address the privacy and security issues of clinical data.…”
Section: Related Workmentioning
confidence: 99%