메뉴 건너뛰기




Volumn 76, Issue 5-6, 2007, Pages 442-448

Long-term verifiability of the electronic healthcare records' authenticity

Author keywords

Archiving; Digital signatures; Electronic healthcare record (EHR); Notarization; Security

Indexed keywords

ACCESS CONTROL; DATA STRUCTURES; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INFORMATION RETRIEVAL; MEDICAL COMPUTING;

EID: 33947651649     PISSN: 13865056     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijmedinf.2006.09.010     Document Type: Article
Times cited : (34)

References (18)
  • 1
    • 1842526990 scopus 로고    scopus 로고
    • A security architecture for interconnecting health information systems
    • Gritzalis D., and Lambrinoudakis C. A security architecture for interconnecting health information systems. Int. J. Med. Inform. 73 (2004) 305-309
    • (2004) Int. J. Med. Inform. , vol.73 , pp. 305-309
    • Gritzalis, D.1    Lambrinoudakis, C.2
  • 2
    • 1842474926 scopus 로고    scopus 로고
    • Authorization and access control for electronic health record systems
    • Blobel B. Authorization and access control for electronic health record systems. Int. J. Med. Inform. 73 (2004) 251-257
    • (2004) Int. J. Med. Inform. , vol.73 , pp. 251-257
    • Blobel, B.1
  • 4
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest R., Shamir A., and Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Com. ACM 21 2 (1978) 120-126
    • (1978) Com. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 7
    • 0034969582 scopus 로고    scopus 로고
    • An integrated architecture for deploying a virtual private medical network over the Web
    • Gritzalis S., Gritzalis D., Moulinos K., and Iliadis J. An integrated architecture for deploying a virtual private medical network over the Web. Med. Inform. Internet Med. 26 1 (2001) 49-72
    • (2001) Med. Inform. Internet Med. , vol.26 , Issue.1 , pp. 49-72
    • Gritzalis, S.1    Gritzalis, D.2    Moulinos, K.3    Iliadis, J.4
  • 8
    • 25844502437 scopus 로고    scopus 로고
    • Technical guidelines for enhancing privacy and data protection in modern electronic medical environments
    • Gritzalis S., Lambrinoudakis C., Lekkas D., and Deftereos S. Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Trans. Inform. Technol. BioMed. 9 3 (2005) 413-423
    • (2005) IEEE Trans. Inform. Technol. BioMed. , vol.9 , Issue.3 , pp. 413-423
    • Gritzalis, S.1    Lambrinoudakis, C.2    Lekkas, D.3    Deftereos, S.4
  • 9
    • 33947692931 scopus 로고    scopus 로고
    • D. Pinkas, J. Ross, N. Pope, Long term electronic signatures, IETF Request For Comments, No. 3126, 2001, available at http://www.ietf.org/rfc/rfc3126.txt (date last accessed: 3/20/2006).
  • 10
    • 33947691837 scopus 로고    scopus 로고
    • C. Wallace, S. Chokhani, Trusted Archiving, Orion Security Solutions, 2003, available at http://middleware.internet2.edu/pki04/proceedings/trusted_archiving.pdf (date last accessed: 3/20/2006).
  • 12
    • 0035387149 scopus 로고    scopus 로고
    • Secure digital archiving of high-value data
    • Wright T. Secure digital archiving of high-value data. BT Technol. J. 19 3 (2001) 60-66
    • (2001) BT Technol. J. , vol.19 , Issue.3 , pp. 60-66
    • Wright, T.1
  • 13
    • 3042721014 scopus 로고    scopus 로고
    • A metadata approach to preservation of digital resources: the University of North Texas libraries' experience
    • Alemneh D., Hastings S., and Hartman C. A metadata approach to preservation of digital resources: the University of North Texas libraries' experience. First Monday J. 7 8 (2002)
    • (2002) First Monday J. , vol.7 , Issue.8
    • Alemneh, D.1    Hastings, S.2    Hartman, C.3
  • 15
    • 0041376599 scopus 로고    scopus 로고
    • Establishing and managing trust within the public key infrastructure
    • Lekkas D. Establishing and managing trust within the public key infrastructure. Comput. Commun. 26 16 (2003) 1815-1825
    • (2003) Comput. Commun. , vol.26 , Issue.16 , pp. 1815-1825
    • Lekkas, D.1
  • 16
    • 0035426894 scopus 로고    scopus 로고
    • Risking trust in a public key infrastructure: old techniques of managing risk applied to new technology
    • Fernandes A. Risking trust in a public key infrastructure: old techniques of managing risk applied to new technology. Decis. Support Syst. 31 (2001) 303-322
    • (2001) Decis. Support Syst. , vol.31 , pp. 303-322
    • Fernandes, A.1
  • 17
    • 0034159709 scopus 로고    scopus 로고
    • Achieving interoperability in a multiple-security policies environment
    • Kokolakis S., and Kiountouzis E. Achieving interoperability in a multiple-security policies environment. Comput. Secur. 19 3 (2000) 267-281
    • (2000) Comput. Secur. , vol.19 , Issue.3 , pp. 267-281
    • Kokolakis, S.1    Kiountouzis, E.2
  • 18
    • 33947636835 scopus 로고    scopus 로고
    • M. Bartel, J. Boyer, B. Fox, B. LaMacchia, E. Simon, XML-Signature Syntax and Processing, W3C Recommendation, 2002, available at http://www.w3.org/TR/xmldsig-core/ (date last accessed: 3/20/2006).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.