Secure Exchange of Electronic Health Records

Secure Exchange of Electronic Health Records

Alejandro Enrique Flores, Khin Than Win, Willy Susilo
ISBN13: 9781466629196|ISBN10: 1466629193|EISBN13: 9781466629202
DOI: 10.4018/978-1-4666-2919-6.ch048
Cite Chapter Cite Chapter

MLA

Flores, Alejandro Enrique, et al. "Secure Exchange of Electronic Health Records." IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2013, pp. 1059-1079. https://doi.org/10.4018/978-1-4666-2919-6.ch048

APA

Flores, A. E., Win, K. T., & Susilo, W. (2013). Secure Exchange of Electronic Health Records. In I. Management Association (Ed.), IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 1059-1079). IGI Global. https://doi.org/10.4018/978-1-4666-2919-6.ch048

Chicago

Flores, Alejandro Enrique, Khin Than Win, and Willy Susilo. "Secure Exchange of Electronic Health Records." In IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1059-1079. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2919-6.ch048

Export Reference

Mendeley
Favorite

Abstract

Protecting the confidentiality of a patient’s information in a shared care environment could become a complex task. Correct identification of users, assigning of access permissions, and resolution of conflict rise as main points of interest in providing solutions for data exchange among health care providers. Traditional approaches such as Mandatory Access Control, Discretionary Access control and Role-Based Access Control policies do not always provide a suitable solution for health care settings, especially for shared care environments. The core of this contribution consists in the description of an approach which uses attribute-based encryption to protect the confidentiality of patients’ information during the exchange of electronic health records among healthcare providers. Attribute-based encryption allows the reinforcing of access policies and reduces the risk of unauthorized access to sensitive information; it also provides a set of functionalities which are described using a case study. Attribute-based encryption provides an answer to restrictions presented by traditional approaches and facilitate the reinforcing of existing security policies over the transmitted data.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.