Security and Privacy Issues in Ehealthcare Systems: Towards Trusted Services
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 9
Abstract
Recent years have witnessed a widespread availability of electronic healthcare data record (EHR) systems. Vast amounts of health data were generated in the process of treatment in medical centers such hospitals, clinics, or other institutions. To improve the quality of healthcare service, EHRs could be potentially shared by a variety of users. This results in significant privacy issues that should be addressed to make the use of EHR practical. In fact, despite the recent research in designing standards and regulations directives concerning security and privacy in EHR systems, it is still, however, not completely settled out the privacy challenges. In this paper, a systematic literature review was conducted concerning the privacy issues in electronic healthcare systems. More than 50 original articles were selected to study the existing security approaches and figure out the used security models. Also, a novel Context-aware Access Control Security Model (CARE) is proposed to capture the scenario of data interoperability and support the security fundamentals of healthcare systems along with the capability of providing fine-grained access control.
Authors and Affiliations
Isra’a Zriqat, Ahmad Altamimi
New Simulation Method of New HV Power Supply for Industrial Microwave Generators with N=2 Magnetrons
This original work treats a new simulation method of a new type of high voltage power supply for microwave generators with N magnetrons (treated case: N=2 magnetrons), used as a source of energy in the industrial applica...
New 2-D Adaptive K-Best Sphere Detection for Relay Nodes
Relay nodes are the main players of cooperative networks that used to improve the system performance and to offer virtual multiple antennas for limited antenna devices in a multi-user environment. However, employing rela...
The Throughput Flow Constraint Theorem and its Applications
The paper states and proves an important result related to the theory of flow networks with disturbed flows:“the throughput flow constraint in any network is always equal to the throughput flow constraint in its dual net...
Implementation of Winnowing Algorithm with Dictionary English-Indonesia Technique to Detect Plagiarism
The ease of obtaining information that is easy, fast, and cheap from all over the world through the internet network can encourage someone to take action plagiarism. Plagiarism is an intellectual crime that often occurs...
A Topic based Approach for Sentiment Analysis on Twitter Data
Twitter has grown in popularity during the past decades. It is now used by millions of users who share information about their daily life and their feelings. In order to automatically process and analyze these data, appl...