Shilpa Srivastava, Namrata Agarwal, M. Pant, A. Abraham
{"title":"印度电子医疗系统的安全模型","authors":"Shilpa Srivastava, Namrata Agarwal, M. Pant, A. Abraham","doi":"10.1109/ISIAS.2013.6947740","DOIUrl":null,"url":null,"abstract":"The inclusion of information technology in health sector has initiated a promising revolution in the area of health care. However, like in all other IT sectors, security issues are of primary concern in e-health care systems. In the present study, considering the Indian e-health scenario we have proposed a model, which integrates the authorization (role based and attribute based) and authentication techniques simultaneously. The suggested model utilizes “Aadhaar” an upcoming identification proof provided by UIDAI (Unique Identification Authority of India) an agency of Government Of India along with spatial &Temporal constraints for the purpose of authentication. Further we have also designed an algorithm for the implementation of same.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A secured model for Indian e-health system\",\"authors\":\"Shilpa Srivastava, Namrata Agarwal, M. Pant, A. Abraham\",\"doi\":\"10.1109/ISIAS.2013.6947740\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The inclusion of information technology in health sector has initiated a promising revolution in the area of health care. However, like in all other IT sectors, security issues are of primary concern in e-health care systems. In the present study, considering the Indian e-health scenario we have proposed a model, which integrates the authorization (role based and attribute based) and authentication techniques simultaneously. The suggested model utilizes “Aadhaar” an upcoming identification proof provided by UIDAI (Unique Identification Authority of India) an agency of Government Of India along with spatial &Temporal constraints for the purpose of authentication. Further we have also designed an algorithm for the implementation of same.\",\"PeriodicalId\":370107,\"journal\":{\"name\":\"2013 9th International Conference on Information Assurance and Security (IAS)\",\"volume\":\"66 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 9th International Conference on Information Assurance and Security (IAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIAS.2013.6947740\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 9th International Conference on Information Assurance and Security (IAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIAS.2013.6947740","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The inclusion of information technology in health sector has initiated a promising revolution in the area of health care. However, like in all other IT sectors, security issues are of primary concern in e-health care systems. In the present study, considering the Indian e-health scenario we have proposed a model, which integrates the authorization (role based and attribute based) and authentication techniques simultaneously. The suggested model utilizes “Aadhaar” an upcoming identification proof provided by UIDAI (Unique Identification Authority of India) an agency of Government Of India along with spatial &Temporal constraints for the purpose of authentication. Further we have also designed an algorithm for the implementation of same.