Initial Experiences of Accessing Patient Confidential Data over the Internet using a Public Key Infrastructure
نویسندگان
چکیده
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care (hospital) diabetes information system, has been implemented. We describe the application that we chose to distribute (a diabetes register); the security mechanisms we used to protect the data (a public key infrastructure with strong encryption and digitally signed messages, plus a firewall); the reasons for the implementation decisions we made; the validation testing that we performed and the preliminary results of the pilot implementation.
منابع مشابه
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care (hospital) diabetes information system, has been implemented. We describe the application that we chose to distribute (a diabetes register); the security mechanisms we used to protect the data (a public key infrastruc...
متن کاملPublic key infrastructure: a micro and macro analysis
The Internet has increasingly been used for communication between people. Most users have no problem relaying messages, which do not contain confidential information, over a network. Yet, for it to be accepted as a medium of conducting monetary transactions there will need to be a higher degree of confidence in the technology’s reliability and security. No one will agree to send his or her fina...
متن کاملTrust and Public Key Infrastructure
In the current rocket-speed growing E-commerce market, certain infrastructure, which enables users to exchange information and money securely over the Internet, is essential. Unfortunately, Internet is mere a cloud of connections of nodes. There is no organization to operate and manage. So the Internet itself is not responsible for any malicious frauds and attacks, and failures caused by reliab...
متن کاملSmart Cards Aren't Always the Smart Choice
enerally speaking, the more you pay for security, the more you get. However, security services also suffer from the law of diminishing returns. At some point, the costs of using the next feature-rich component outweigh the benefits you gain. The transition from worthwhile benefit to mere financial sink occurs at different points on the security continuum depending on the particular environment ...
متن کاملWhen BGP Security Meets Content Deployment: Measuring and Analysing RPKI-Protection of Websites
Web content delivery is one of the most important services on the Internet. A secure access to websites is typically granted via SSL. However, traffic hijacking on the network layer may break this security model and makes additional protective mechanisms necessary. This paper presents a first quantitative analysis of the protection of web servers by RPKI, a recently deployed Resource Public Key...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000