Implementing Authentication (LAP) and Monitoring in Healthcare Information Systems
نویسندگان
چکیده
Throughout the healthcare domain, paper records and forms are being supplanted by electronic records, which are now routinely transmitted over intranets (within organizations), extranets (between organizations) and the Internet (to multiple organizations, worldwide). The potential for greater efficiency, lower costs and enhanced quality of care afforded by electronic versus paper-based records and communication in healthcare is vast. Electronic messaging is quickly becoming the standard for transmitting information in the healthcare industry. The security of transmitted information is a very critical issue. In this article, we report on the development of a Lightweight Authentication Protocol (LAP), which makes a mobile and distributed system more secure and flexible, and we implement it in a healthcare environment where the clinicians use mobile and wireless devices like PDAs. The implementation scenario and the special characteristics of healthcare information systems are described in detail. We also propose a monitoring system that involves patient credentials in order to monitor doctor access to the medical records. Our work shows that it is possible for a PDA to have access to a system like a healthcare Web database system with reasonable performance according to the theoretical analysis.
منابع مشابه
On the use of multi-agent systems for the monitoring of industrial systems
The objective of the current paper is to present an intelligent system for complex process monitoring, based on artificial intelligence technologies. This system aims to realize with success all the complex process monitoring tasks that are: detection, diagnosis, identification and reconfiguration. For this purpose, the development of a multi-agent system that combines multiple intelligences su...
متن کاملThe Feasibility of Deploying Business Process Management in Hospitals in Iran
Background: Business process management systems (BPM) can automate all processes in an organization. These systems provide the possibility of identifying, modeling, deploying, implementing, function managing, integrating with other information systems, monitoring and improving an organization's business processes in a standard form. As far as the authors know, no related resear...
متن کاملRole and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Health Informatics Journal
دوره 9 شماره
صفحات -
تاریخ انتشار 2003