{"title":"Security and confidentiality in healthcare informatics","authors":"Y. Al-Salqan","doi":"10.1109/ENABL.1998.725720","DOIUrl":null,"url":null,"abstract":"In order to provide secure healthcare informatics systems, three different security levels need to be considered: 1) secure healthcare applications to provide user authentication and access control mechanism to healthcare applications, components, and objects.; 2) secure database to provide the protection of the database against unauthorized disclosure, alteration, or distinction of healthcare information by legal personnel; and 3) secure communication infrastructure which provides the protection of healthcare informatics systems from unauthorized attempts to access information or interfere with its operation. The author emphasises the database and communication security. Several issues are learned from experience in the Advanced Research TEstbed on Medical Information System (ARTEMIS) project.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1996-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ENABL.1998.725720","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
In order to provide secure healthcare informatics systems, three different security levels need to be considered: 1) secure healthcare applications to provide user authentication and access control mechanism to healthcare applications, components, and objects.; 2) secure database to provide the protection of the database against unauthorized disclosure, alteration, or distinction of healthcare information by legal personnel; and 3) secure communication infrastructure which provides the protection of healthcare informatics systems from unauthorized attempts to access information or interfere with its operation. The author emphasises the database and communication security. Several issues are learned from experience in the Advanced Research TEstbed on Medical Information System (ARTEMIS) project.