2016
DOI: 10.1016/j.ijinfomgt.2016.07.006
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 84 publications
(24 citation statements)
references
References 22 publications
0
23
0
Order By: Relevance
“…General technical controls applied by the health sector include encryption, authentication, and authorization to protect data from cyber threats [ 63 ]. Cryptographic security is used to address data sharing and storage of patient information across network systems [ 66 ]. Homomorphic encryption is applied to ensure robust security and privacy guarantees while enabling analysis of encrypted data and sensitive medical information [ 64 ].…”
Section: Resultsmentioning
confidence: 99%
“…General technical controls applied by the health sector include encryption, authentication, and authorization to protect data from cyber threats [ 63 ]. Cryptographic security is used to address data sharing and storage of patient information across network systems [ 66 ]. Homomorphic encryption is applied to ensure robust security and privacy guarantees while enabling analysis of encrypted data and sensitive medical information [ 64 ].…”
Section: Resultsmentioning
confidence: 99%
“…Information Security Management is a set of policies, standards, and procedures by which an organization protects its vital information assets, especially the ones that hold sensitive information, and close the gap in their security systems and processes through risk management (Gardiyawasam and Oleshchuk, 2016). An information security policy is the foundation of any information security management system as it defines the roles, responsibilities, and decision-making activities that tie information security in the daily business processes and procedures (Edwards, 2013).…”
Section: Conclusion and Resultsmentioning
confidence: 99%
“…Especially we plan to apply the future solutions for kids as in [29], because they not be aware of the symptoms. Moreover, we also plan to include a privacy mechanism as in [30] to protect in a better way the data gathered from patients and consider new image processing mechanisms to add more functionalities to our solutions as in [31].…”
Section: Discussionmentioning
confidence: 99%