2012
DOI: 10.1007/s10916-012-9843-1
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of Standards-Driven Communication Protocols for Healthcare Scenarios

Abstract: The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…All the XDS and XDM services are given as a courtesy of the company Tiani "Spirit" GmbH 9 , located in Vienna, Austria. An outline of the overall implementation of the protocol is available online [29].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…All the XDS and XDM services are given as a courtesy of the company Tiani "Spirit" GmbH 9 , located in Vienna, Austria. An outline of the overall implementation of the protocol is available online [29].…”
Section: Discussionmentioning
confidence: 99%
“…We refer the interested reader to [29] for a complete account of the specification, and to [16], [25] for the presentation of COWS and of many examples illustrating its peculiarities and expressiveness.…”
Section: Specification and Analysismentioning
confidence: 99%
“…A possible solution of such an authentication flaw, which does not put any requirement on the security of the van itself, is presented in [9]. This work introduces an ad-hoc protocol for exchanging medical records that exploits the XDM standard.…”
Section: Applying the Protocol For Disconnected Clinicsmentioning
confidence: 99%
“…In order to perform analysis on the security of the protocol, a threat model is proposed in [9]. In such a model, an attackerà la Dolev-Yao [13] is used.…”
Section: Applying the Protocol For Disconnected Clinicsmentioning
confidence: 99%
See 1 more Smart Citation