Compromising the security of “generating unique identifiers from patient identification data using security models”
نویسندگان
چکیده
منابع مشابه
Compromising the Security of “Generating Unique identifiers from Patient Identification Data Using Security Models”
Sir, I write with respect to the Technical Note “Generating unique identifiers (IDs) from patient identification data using security models,”[1] the authors of which propose a method to “create a unique one‐way encrypted ID per patient that can be used for data sharing.” In summary, their method involves concatenation of a patient’s date of birth, sex, and surname, utilizing either the MD5 or S...
متن کاملGenerating unique IDs from patient identification data using security models
BACKGROUND The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed ...
متن کاملAirport Security Versus Patient Security: The “Sickurity” Problem
The massive restrain security measurements at the airports very much impress the health status of the healthy and sick passengers alike. The security check is undisputedly a harassment – the confiscation of fluids, the limited movement on the airplane results in a stressful situation and put a harmful effect on healthy traveler and an even more harmful one on the sick. This kind of problem coul...
متن کاملGenerating Unique Identifiers for Smart-Phones Using Software
We present a fast and simple technique for reliably fingerprinting smart-phones. Our technique extracts the fingerprint by capturing the small variation found in digital imaging sensors used in smart-phone cameras. These variations are a result of manufacturing variability and as such, they are different even for identical digital cameras. The main advantage of the technique presented is that i...
متن کاملSecurity Limits for Compromising Emanations
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanations of digital electronics. The nature of these emissions has changed with evolving technology; electromechanic devices have vanished and signal frequencies increased several orders of magnitude. Recently published eaves...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Pathology Informatics
سال: 2017
ISSN: 2153-3539
DOI: 10.4103/jpi.jpi_1_17