A Secure Framework and Related Protocols for Ubiquitous Access to Electronic Health Records Using Java SIM Cards
نویسندگان
چکیده
Ubiquitous access to patient medical records is an important aspect of caring for patient safety. Unavailability of sufficient medical information at the patient point-of-care could possibly lead to a fatality. In this paper we propose employing emergent technologies such as Java SIM Cards (JSC), Smart Phones (SP), Next Generation Networks (NGN), Near Field Communications (NFC), Public Key Infrastructure (PKI), and Biometric Identification to develop a secure framework and related protocols for ubiquitous access to Electronic Health Records (EHRs). A partial EHR contained within a JSC can be used at the patient point-of-care in order to help quick diagnosis of a patient’s problems. The full EHR can be accessed from an Electronic Healthcare Records Centre (EHRC).
منابع مشابه
Analysis of Security Models For Smart Cards
Smart cards are an old breed of ubiquitous embedded-computing devices that are increasingly gaining popularity for electronic business transactions. When these smart cards are used over networks that can be covertly snooped, such as the Internet, there is a potential threat to the security of these transactions. In this report, I describe and analyze security models for smart cards that are use...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملA High Performance Buffering of Java Objects for Java Card Systems with Flash Memory
Java Card technology provides a secure, vendor-independent, ubiquitous Java platform for smart cards and other memory constrained devices such as SIM technology. It is also an open standard in SIM and UIM technology for 3G environment. However, the major point of criticism with regard to Java for smart cards and SIM cards is its low execution speed, aside from its memory demands. We found out t...
متن کاملSecure Collaborative Telemedicine in Rural West Virginia
SCTA supported portable measures for identification and authentication of health care providers via smart cards and public key cryptography, encrypted health care communications, role-based access to distributed health care information services, and remote access to patient vital signs. We developed smart-card applications3 to authenticate health care providers and to provide a portable emergen...
متن کاملPrototyping Web-Based Smart Flow Multi-Application System using Smart Card Technology
These days smart cards are replacing traditional magnetic cards for payment transactions. One of the main reasons is the enhanced security capabilities built into a smart card. Most of the related works in smart card only concentrates on the single application such as network access control, prepaid phone card or debit card. With popularity in web technologies, there is a trend towards smart ca...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010