A Note on the Security in the Card Management System of the German E-Health Card
نویسنده
چکیده
The German compulsory health insurance system will introduce an electronic health card (eHC) in the near future. The eHC is supposed to enable new applications like securely storing electronic health records of patients in a central data center infrastructure so that health professionals can access these data via a common network. In this context, the card management system (CMS) is of special interest since it is used to personalize, issue, and maintain the cards. In this paper, we analyze the functional requirements specification of the CMS in Germany and identify several conflicting and ambiguous requirements. As the most important result, the specification defines technical measures that are insufficient to protect the data and data sovereignty of the patient. We discuss the resulting consequences, which might be helpful to improve the system design before its final deployment.
منابع مشابه
Introducing the Evaluation Tools for HSE Management System Performance Using Balanced Score Card Model
Background; The performance of the HSE units has various dimensions Leading to different performances. Thus, any industry should be capable of evaluating these systems. The aim of this study was to design a standard questionnaire in the field of performance evaluation of HSE management system employing Balanced Score Card model. Methods; In this study we, first determined the criteria to be ev...
متن کاملInvestigating the Adoption Rate of Students' Mental Model with the Structure of the Learning Management System of the University of Tehran by Card Sorting Method
Background and Aim: E-learning is an important topic in the educational settings and students are significant prerequisites of it, who have an essential role for the acceptance and effective use of e-learning management systems so that knowing their attitudes and mental models is essential for the successful implementation of such a method. Therefore, the aim of this study was to investigate...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملMapping CRC Card into Stochastic Petri Net for Analyzing and Evaluating Quality Parameter of Security (TECHNICAL NOTE)
CRC cards are unconventional method for identifying and describing classes, behavior and its responsibilities and collaborators of class. Representation of three categories of class, responsibilities and collaborators can give proper image of scenario. These cards are effective method for analyzing scenarios. With all positive features of CRC cards, of weaknesses of these cards are failure to s...
متن کاملMinimum data set for electronic health card of schizophrenia
Purpose: Having a clinical information system is a good solution for monitoring medical problems. This system is designed to improve the speed and accuracy of data management. The goal is to replace medical records with a clinical information system to support storing, processing and distributing data in all the sections of a healthcare center. The purpose of this research was to determine ...
متن کامل