Compromising the security of “generating unique identifiers from patient identification data using security models”

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Compromising the Security of “Generating Unique identifiers from Patient Identification Data Using Security Models”

Sir, I write with respect to the Technical Note “Generating unique identifiers (IDs) from patient identification data using security models,”[1] the authors of which propose a method to “create a unique one‐way encrypted ID per patient that can be used for data sharing.” In summary, their method involves concatenation of a patient’s date of birth, sex, and surname, utilizing either the MD5 or S...

متن کامل

Generating unique IDs from patient identification data using security models

BACKGROUND The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed ...

متن کامل

Airport Security Versus Patient Security: The “Sickurity” Problem

The massive restrain security measurements at the airports very much impress the health status of the healthy and sick passengers alike. The security check is undisputedly a harassment – the confiscation of fluids, the limited movement on the airplane results in a stressful situation and put a harmful effect on healthy traveler and an even more harmful one on the sick. This kind of problem coul...

متن کامل

Generating Unique Identifiers for Smart-Phones Using Software

We present a fast and simple technique for reliably fingerprinting smart-phones. Our technique extracts the fingerprint by capturing the small variation found in digital imaging sensors used in smart-phone cameras. These variations are a result of manufacturing variability and as such, they are different even for identical digital cameras. The main advantage of the technique presented is that i...

متن کامل

Security Limits for Compromising Emanations

Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanations of digital electronics. The nature of these emissions has changed with evolving technology; electromechanic devices have vanished and signal frequencies increased several orders of magnitude. Recently published eaves...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Pathology Informatics

سال: 2017

ISSN: 2153-3539

DOI: 10.4103/jpi.jpi_1_17