2011
DOI: 10.1007/s10916-011-9793-z
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Integrated Medical Information System

Abstract: The rapid rise and development of the internet has made digitization of our everyday life common. E-medicine, including electronic prescription records, electronic prescriptions, diagnosis information systems, and others are now being regarded as future trends. As development on the structure and format of electronic patient records and prescriptions matures, the implementation of a comprehensive medical information system is imperative, one which is constructed from integrating the various electronic informat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
8
0
2

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 20 publications
0
8
0
2
Order By: Relevance
“…Digital signatures can provide patient privacy with the aid of a Trusted Third Party (TTP) to investigate any unusual medical transactions and prevent illegal and unauthorised activities. The Certificate Authority (CA) is a TTP, which issues certificates and offers services such as 'keeping public keys, offering directory service, and issuing certificates' (Hsiao et al 2012). End-to-end encryption (E2EE), authentication and authorisation may satisfy the basic security requirements in the lower levels with access control policies in the higher levels (Singh et al 2013).…”
Section: Cryptography Techniquesmentioning
confidence: 99%
“…Digital signatures can provide patient privacy with the aid of a Trusted Third Party (TTP) to investigate any unusual medical transactions and prevent illegal and unauthorised activities. The Certificate Authority (CA) is a TTP, which issues certificates and offers services such as 'keeping public keys, offering directory service, and issuing certificates' (Hsiao et al 2012). End-to-end encryption (E2EE), authentication and authorisation may satisfy the basic security requirements in the lower levels with access control policies in the higher levels (Singh et al 2013).…”
Section: Cryptography Techniquesmentioning
confidence: 99%
“…Based on this, the following things need to be considered when developing an integrated medical system : heterogeneous information which need to be shared between several departments, particularities of each department, requirements of medical information systems from local to global, dynamic environment and constantly changing medical information,scalability of medical information systems,scalability of medical information systems, usage of electronic medical record (EMR), efficiency of the medical systems and the latest technologies which can be applied on the medical field [7].…”
Section: Introductionmentioning
confidence: 99%
“…Another study from in Thailand, proposed a Service-Oriented Architecture Prescription System to ease communications between the numerous information systems and, at the same time, protect the anonymity of the involved people (with pseudonyms and proxy signatures) and control the prescriptions emitted (to avoid eventual scenarios of corruption). [8] Another possible solution is the use of smart cards and digital signing. The smart cards in the health area may assume different functions and be used as an ID card, a simple device to store patients' information or an authentication token to access the system.…”
Section: Introductionmentioning
confidence: 99%