dc.contributor.author |
Baldas, V |
en |
dc.contributor.author |
Giokas, K |
en |
dc.contributor.author |
Koutsouris, D |
en |
dc.date.accessioned |
2014-03-01T02:52:43Z |
|
dc.date.available |
2014-03-01T02:52:43Z |
|
dc.date.issued |
2010 |
en |
dc.identifier.issn |
16800737 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/36013 |
|
dc.subject |
access control |
en |
dc.subject |
EHR encryption |
en |
dc.subject |
electronic medical record |
en |
dc.subject |
medical data privacy |
en |
dc.subject.other |
Cryptographic techniques |
en |
dc.subject.other |
EHR encryption |
en |
dc.subject.other |
Electronic medical record |
en |
dc.subject.other |
Encryption key |
en |
dc.subject.other |
Health records |
en |
dc.subject.other |
Hierarchical access control |
en |
dc.subject.other |
Hospital information systems |
en |
dc.subject.other |
Management systems |
en |
dc.subject.other |
Medical companies |
en |
dc.subject.other |
Medical data |
en |
dc.subject.other |
Medical health |
en |
dc.subject.other |
Medical information |
en |
dc.subject.other |
Medical record |
en |
dc.subject.other |
Multilevel access |
en |
dc.subject.other |
Research groups |
en |
dc.subject.other |
Biochemical engineering |
en |
dc.subject.other |
Computer privacy |
en |
dc.subject.other |
Cryptography |
en |
dc.subject.other |
Data privacy |
en |
dc.subject.other |
Hospitals |
en |
dc.subject.other |
Medical computing |
en |
dc.subject.other |
Records management |
en |
dc.subject.other |
Security systems |
en |
dc.subject.other |
Access control |
en |
dc.title |
Multilevel access control in hospital information systems |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1007/978-3-642-13039-7_230 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1007/978-3-642-13039-7_230 |
en |
heal.publicationDate |
2010 |
en |
heal.abstract |
With many hospitals adopting new computer based health records management systems, an old question about the medical records privacy is once again posed. However, with the use of certain cryptographic techniques we can ensure that each part of a patient's medical record is only readable by the ones that must have access to it. This paper presents a novel medical data access control, that is based on the Akl-Taylor hierarchical access control technique. According to the proposed scheme, the individuals that can have access to the patient's record are divided into four seperate classes, each with different authorization level. A specific encryption key is assigned to each class, in a way that a class with higher authorization level, can derive the key of any class below them. Our medical data encryption technique, provides each user with a key that will give him access only to the data he needs to know. In addition, the proposed scheme makes it possible for medical health records to be used by research groups or even medical companies, in a totally anonymous way that does not compromise the privacy of the medical information. © 2010 International Federation for Medical and Biological Engineering. |
en |
heal.journalName |
IFMBE Proceedings |
en |
dc.identifier.doi |
10.1007/978-3-642-13039-7_230 |
en |
dc.identifier.volume |
29 |
en |
dc.identifier.spage |
909 |
en |
dc.identifier.epage |
912 |
en |