An authentication architecture for healthcare information systems
نویسندگان
چکیده
a well-written and implemented policy contains sufficient information on what must be done to protect the organization's data. According to the Health Insurance Portability and Accountability Act [1] and ISO 1779 [2], which is based upon BS7799, authentication mechanisms are defined as part of the security policy that a healthcare information system should follow. The distributed nature of the healthcare delivery system suggests the need for authenti-cation mechanisms that are not location or machine dependent. That is, the technology used to assure the identity of a specific user must offer the flexibility to allow that user to gain access to information from remote locations. System specifications should make provisions to allow authorized users multiple points of access using a standard mobile identification credential [3]. In this paper, we propose an authentication architecture for healthcare information systems and an underlying authentication protocol that exploits the benefits of using modern cryptographic techniques [4]. The architecture focuses on the authentication of users who request access to the resources of a healthcare information system through the fixed network or the Web. Healthcare information systems (HIS) are characterized by the need to support specific requirements for the protection of personal and medical patient data usually stored in distributed database systems due to the increased mobility of the patient populations. As a result, a patient's computerized medical information is accumulated in a variety of locations and it may be accessed via remote workstations and complex networks supporting one or more organizations [5]. A critical point concerning the security of healthcare information systems is the assurance of patient privacy by restricting access to the medical record (especially sensitive information) to authorized users only. This concern becomes more and more important in distributed environments. However, the increased risk in this case does not come so much from transmitting the information through the network, where strong encryption algorithms can be used sufficiently, but from the huge number of users requiring access and the difficulty in verifying their identity and evaluating their clearance to do so. Security of HIS requires the use of special security policies that are able to preserve all three security components at the same time: The medical community is moving towards an environment where automated patient medical records and electronically interconnected health-care facilities are prevalent. The primary reason is that the electronic healthcare record, coupled with the electronic networking of hospitals, can provide healthcare organizations with …
منابع مشابه
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملProposing an Appropriate Architecture for Decision Support Systems in the Field of Complex Chronic Care: Micro-Services Based Software Architecture in Kidney Transplant Care
Introduction: Development and successfully implementation of knowledge based clinical decision support system (KBCDSS) in kidney transplantation (KT) could support decision-making, reduce cost and improve quality of care. For practical use of these systems, however, many challenges have to be met. Besides to well-recognized challenges of design and implementation of information systems in heal...
متن کاملProposing an Appropriate Architecture for Decision Support Systems in the Field of Complex Chronic Care: Micro-Services Based Software Architecture in Kidney Transplant Care
Introduction: Development and successfully implementation of knowledge based clinical decision support system (KBCDSS) in kidney transplantation (KT) could support decision-making, reduce cost and improve quality of care. For practical use of these systems, however, many challenges have to be met. Besides to well-recognized challenges of design and implementation of information systems in heal...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002