2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom) 2020
DOI: 10.1109/blackseacom48709.2020.9235005
|View full text |Cite
|
Sign up to set email alerts
|

Performance of a Security Control Scheme for a Health Data Exchange System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…Michalas et al, on the other hand, experimented with a method of sharing Electronic Health Records (EHRs) between different cloud providers in their health share solution [11], using attribute-based encryption to ensure the security of the data. The research by Gelenbe et al [12] is also similar to the introduced approach, measuring and evaluating the performance of a health data sharing system.…”
Section: State Of the Artmentioning
confidence: 96%
“…Michalas et al, on the other hand, experimented with a method of sharing Electronic Health Records (EHRs) between different cloud providers in their health share solution [11], using attribute-based encryption to ensure the security of the data. The research by Gelenbe et al [12] is also similar to the introduced approach, measuring and evaluating the performance of a health data sharing system.…”
Section: State Of the Artmentioning
confidence: 96%
“…Thus the work in [111] presents an overall view and challenges of the project, while in [98] the authors present an analysis of the corresponding user requirements. Such systems have obvious performance optimization issues which are discussed in [72]. Keeping track of the transactions in such a system through blockchains is suggested in [9].…”
Section: Security Of the Trans-european Health Informatics Networkmentioning
confidence: 99%
“…24 The detailed results of our analysis have been published in recent papers. 15,14 Lessons learned Technical integration. One of the key technical activities of the KONFIDO project aimed to integrate the developed technical solution with a federation of different "actors" at Regional, National and European level, with several threats to security and integrity of personal health data that might arise.…”
Section: Homomorphic Encryption (He) Component Konfido Homomorphic Encryption (He) Componentmentioning
confidence: 99%
“…Emphasizing the crucial role of end-user authentication, the KONFIDO technical solution has been based on the framework established by the eIDAS regulation. 14 eIDAS enables a European citizen to use a digital identity issued in his/her home country, for accessing digital public services provided by other European Union Member States. From this perspective, eIDAS is also relevant for the services related with the so-called eHealth Digital Service Infrastructure (eHDSI), aiming to support citizens when they are abroad and need to access a healthcare service from their temporary country of stay and not from their country of origin.…”
Section: Technical Approachmentioning
confidence: 99%