2021
DOI: 10.3390/s21030713
|View full text |Cite
|
Sign up to set email alerts
|

Security Privacy and Policy for Cryptographic Based Electronic Medical Information System

Abstract: With the development of the internet, applications have become complicated, and the relevant technology has diversified. Compared with medical applications, the significance of information technology has been expanding to include clinical auxiliary functions of medical information. This includes electronic medical records, electronic prescriptions, medical information systems, etc. Although research on the data processing structure and format of various related systems is becoming mature, the integration is in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…Singh et al recently proposed a quantum communication model system suitable for future information and communication technology and methodology flow, showing how to use block chain in quantum computing and quantum cryptography to provide security and privacy in information sharing [4]. Chen proposed a comprehensive medical information system with security policy and privacy protection function, which can effectively apply and save medical resources, meet the mobility of medical records, and reflect the function and security of drug collection [5]. Tang and other scholars designed an improved hybrid algorithm under the deep learning of information technology and applied it to the actual medical material distribution system, which effectively reduced the distribution cost, shortened the transportation route, and improved the optimization efficiency [6].…”
Section: Introductionmentioning
confidence: 99%
“…Singh et al recently proposed a quantum communication model system suitable for future information and communication technology and methodology flow, showing how to use block chain in quantum computing and quantum cryptography to provide security and privacy in information sharing [4]. Chen proposed a comprehensive medical information system with security policy and privacy protection function, which can effectively apply and save medical resources, meet the mobility of medical records, and reflect the function and security of drug collection [5]. Tang and other scholars designed an improved hybrid algorithm under the deep learning of information technology and applied it to the actual medical material distribution system, which effectively reduced the distribution cost, shortened the transportation route, and improved the optimization efficiency [6].…”
Section: Introductionmentioning
confidence: 99%
“…The researchers of [18] proposed an integrated system that protects the privacy of different types of information regarding health systems, including telemedicine. This system combines medical information, such as e-prescriptions, smart cards, e-patient records, and fingerprint identification, and applies proxy and group signatures.…”
Section: Privacy-preserving Approaches In Telemedicinementioning
confidence: 99%
“…Privacy Preservation [11] Newton-Raphson [12] Neural Network [13] Index-based [31] Blockchain [32] Attribute Encryption XACML [16] Hyper-ledger [18] Proxy Signature Group Signature [15] Blockchain [24] Index-based [25] Index-based [26] DGHV HE [27] Index-based…”
Section: Paper Technique Used Confidentiality He Searching Capabilitymentioning
confidence: 99%
“…Third, to strengthen information security management, hospitals should continuously improve the level of information; effectively standardize the use, collection, development, and ownership of data; strictly verify the identity and access rights; steadily improve the level of data encryption; and preferably ensure the integrity, con dentiality, and availability of information [20]. Moreover, cloud computing and security mechanisms can be combined to improve the security and operability of information systems [ 21 22].…”
Section: Suggestions For Future Effortsmentioning
confidence: 99%