Literature DB >> 15684133

Wireless technology infrastructures for authentication of patients: PKI that rings.

Ulrich Sax1, Isaac Kohane, Kenneth D Mandl.   

Abstract

As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system.

Entities:  

Mesh:

Year:  2005        PMID: 15684133      PMCID: PMC1090456          DOI: 10.1197/jamia.M1681

Source DB:  PubMed          Journal:  J Am Med Inform Assoc        ISSN: 1067-5027            Impact factor:   4.497


  13 in total

1.  Public standards and patients' control: how to keep electronic medical records accessible but private.

Authors:  K D Mandl; P Szolovits; I S Kohane
Journal:  BMJ       Date:  2001-02-03

2.  Personal health records on the internet: a snapshot of the pioneers at the end of the 20th Century.

Authors:  Dean F Sittig
Journal:  Int J Med Inform       Date:  2002-04       Impact factor: 4.046

3.  Implementing security and access control mechanisms for an electronic healthcare record.

Authors:  Frank K Ueckert; Hans-Ulrich Prokosch
Journal:  Proc AMIA Symp       Date:  2002

4.  Improving computer security for authentication of users: influence of proactive password restrictions.

Authors:  Robert W Proctor; Mei-Ching Lien; Kim-Phuong L Vu; E Eugene Schultz; Gavriel Salvendy
Journal:  Behav Res Methods Instrum Comput       Date:  2002-05

5.  The PING personally controlled electronic medical record system: technical architecture.

Authors:  William W Simons; Kenneth D Mandl; Isaac S Kohane
Journal:  J Am Med Inform Assoc       Date:  2004-10-18       Impact factor: 4.497

6.  Health information identification and de-identification toolkit.

Authors:  I S Kohane; H Dong; P Szolovits
Journal:  Proc AMIA Symp       Date:  1998

7.  Against simple universal health-care identifiers.

Authors:  P Szolovits; I Kohane
Journal:  J Am Med Inform Assoc       Date:  1994 Jul-Aug       Impact factor: 4.497

8.  Personal health records: evaluation of functionality and utility.

Authors:  Matthew I Kim; Kevin B Johnson
Journal:  J Am Med Inform Assoc       Date:  2002 Mar-Apr       Impact factor: 4.497

9.  The personal internetworked notary and guardian.

Authors:  A Riva; K D Mandl; D H Oh; D J Nigrin; A Butte; P Szolovits; I S Kohane
Journal:  Int J Med Inform       Date:  2001-06       Impact factor: 4.046

10.  A Wireless Health Outcomes Monitoring System (WHOMS): development and field testing with cancer patients using mobile phones.

Authors:  Emilia Bielli; Fabio Carminati; Stella La Capra; Micaela Lina; Cinzia Brunelli; Marcello Tamburini
Journal:  BMC Med Inform Decis Mak       Date:  2004-06-15       Impact factor: 2.796

View more
  6 in total

1.  Implementation issues for mobile-wireless infrastructure and mobile health care computing devices for a hospital ward setting.

Authors:  Liza Heslop; Stephen Weeding; Linda Dawson; Julie Fisher; Andrew Howard
Journal:  J Med Syst       Date:  2009-03-11       Impact factor: 4.460

2.  Personal health record systems and their security protection.

Authors:  Khin Than Win; Willy Susilo; Yi Mu
Journal:  J Med Syst       Date:  2006-08       Impact factor: 4.460

3.  Early experiences with personal health records.

Authors:  John D Halamka; Kenneth D Mandl; Paul C Tang
Journal:  J Am Med Inform Assoc       Date:  2007-10-18       Impact factor: 4.497

4.  A research agenda for personal health records (PHRs).

Authors:  David C Kaelber; Ashish K Jha; Douglas Johnston; Blackford Middleton; David W Bates
Journal:  J Am Med Inform Assoc       Date:  2008-08-28       Impact factor: 4.497

5.  Evaluating authentication options for mobile health applications in younger and older adults.

Authors:  Kelly Grindrod; Hassan Khan; Urs Hengartner; Stephanie Ong; Alexander G Logan; Daniel Vogel; Robert Gebotys; Jilan Yang
Journal:  PLoS One       Date:  2018-01-04       Impact factor: 3.240

6.  Indivo: a personally controlled health record for health information exchange and communication.

Authors:  Kenneth D Mandl; William W Simons; William C R Crawford; Jonathan M Abbett
Journal:  BMC Med Inform Decis Mak       Date:  2007-09-12       Impact factor: 2.796

  6 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.