On Secure Data Management in Health-Care Environment

作者: Arcangelo Castiglione , Ciriaco D'Ambrosio , Alfredo De Santis , Aniello Castiglione , Francesco Palmieri

DOI: 10.1109/IMIS.2013.120

关键词:

摘要: Health-care management systems are of great relevance because they provide an easy and quick all aspects regarding a patient, not necessarily medical. Furthermore, there more cases pathologies in which diagnosis treatment can be only carried out by using medical imaging techniques. With ever-increasing prevalence, images directly acquired or converted into digital form, for their storage as well subsequent retrieval processing. Similarly, text interpreting image with other associated patient information, included form stored. It is to note that greater the amount clinical data available specialists, example on previously treated cases, better quality rapidity treatment. therefore important, if essential, share easily quickly experiences. However, such sharing among different entities, whether public private, non-trivial task, since information always subjected restrictions related privacy laws health insurance regulations. To best our knowledge, literature no allows rapid secure experiences entities. We propose fully distributed system (both not) necessary patients management. system, each node belonging it, access quickly, way considerable data, thereby improving speed evaluation performed physician.

参考文章(26)
J. Postel, Transmission Control Protocol Internet Request for Comment (RFC793). ,vol. 793, pp. 1- 91 ,(1981)
J.B.A. Maintz, Viergever, An Overview of Medical Image Registration Methods Utrecht University: Information and Computing Sciences. ,(1998)
J. Postel, User Datagram Protocol RFC768. ,vol. 768, pp. 1- 3 ,(1980)
Matthew J Goldschmidt, Charles L Castiglione, Leon A Assael, Mark D Litt, Craniomaxillofacial trauma in the elderly. Journal of Oral and Maxillofacial Surgery. ,vol. 53, pp. 1145- 1149 ,(1995) , 10.1016/0278-2391(95)90620-7
Alan F. Dowling, Do Hospital Staff Interfere with Computer System Implementation? Computers and Medicine. ,vol. 5, pp. 302- 317 ,(1980) , 10.1007/978-1-4613-8674-2_19
Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci, Efficient provably-secure hierarchical key assignment schemes Theoretical Computer Science. ,vol. 412, pp. 5684- 5699 ,(2011) , 10.1016/J.TCS.2011.06.024
H K Kalitay, M K Nambiarz, Designing WANem : A Wide Area Network emulator tool communication systems and networks. pp. 1- 4 ,(2011) , 10.1109/COMSNETS.2011.5716495
Aniello Castiglione, Alfredo De Santis, Ugo Fiore, Francesco Palmieri, An asynchronous covert channel using spam Computers & Mathematics With Applications. ,vol. 63, pp. 437- 447 ,(2012) , 10.1016/J.CAMWA.2011.07.068
J.S. Duncan, N. Ayache, Medical image analysis: progress over two decades and the challenges ahead IEEE Transactions on Pattern Analysis and Machine Intelligence. ,vol. 22, pp. 85- 106 ,(2000) , 10.1109/34.824822
Martha Giangiulio, Lisa Aurilio, Pam Baker, Beth Brienza, Ellie Moss, Nicole Twinem, Initiation and Evaluation of an Admission, Discharge, Transfer (ADT) Nursing Program in a Pediatric Setting Issues in Comprehensive Pediatric Nursing. ,vol. 31, pp. 61- 70 ,(2008) , 10.1080/01460860802023117