Towards Second-generation Smart Card-Based Authentication in Health Information Systems: The Secure Server Model

نویسندگان

  • Jonas Hallberg
  • Niklas Hallberg
  • Toomas Timpka
چکیده

Conventional smart card-based authentication systems used in health care alleviate some of the security issues in user and system authentication. Existing models still do not cover all security aspects. To enable new protective measures to be developed, an extended model of the authentication process is presented. This model includes a new entity referred to as secure server. Assuming a secure server, a method where the smart card is aware of the status of the terminal integrity verification becomes feasible. The card can then act upon this knowledge and restrict the exposure of sensitive information to the terminal as required in order to minimize the risks. The secure server model can be used to illuminate the weaknesses of current approaches and the need for extensions which alleviate the resulting risks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Password based Multi-server Authentication Schemes

As of today, numerous researchers have explored the issue of secure and efficient smart card based authentication scheme for these variety of application areas. This article explores the background research on the single server smart card authentication schemes as well as multi-server smart card authentication schemes and its associated research gaps. This article gives comparative analysis of ...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

An efficient biometrics-based authentication scheme for telecare medicine information systems

The telecare medical information system enables the patients gain health monitoring and access healthcare-related services over internet or mobile networks. Due to the open environment, the mutual authentication between the user and the telecare server will thus be in demand. Many smart card based authentication schemes for telecare medicine information systems have been proposed for the goals....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Studies in health technology and informatics

دوره 84 Pt 2  شماره 

صفحات  -

تاریخ انتشار 2001