During the last decade, many countries launched ambitious Electronic Health Record (EHR) programs with the objective to increase the quality of care while decreasing its cost. Pervasive healthcare aims itself at making healthcare information securely available anywhere and anytime, even in disconnected environments (e.g., at patient home). Current server-based EHR solutions badly tackle disconnected situations and fail in providing ultimate security guarantees for the patients. The solution proposed in this chapter capitalizes on a new hardware device combining a secure microcontroller (similar to a smart card chip) with a large external Flash memory on a USB key form factor. Embedding the patient folder as well as a database system and a w...
In such an unfortunate situation of a medical emergency, a lot of people tend to lose their lives wh...
© 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish th...
The goal of this chapter is to discuss the challenges of generic security protocols and platforms fo...
Chapter IXDuring the last decade, many countries launched ambitious Electronic Health Record (EHR) p...
International audienceDuring the past decade, many countries launched ambitious Electronic Health Re...
Paper-based folders have been widely used to coordinate cares in medical-social networks, but they i...
International audiencePaper-based folders have been widely used to coordinate cares in medical-socia...
Medical records have been moving from paper-based systems to electronic form in recent decades. This...
With the development of online services, the traditional paper-based healthcare services are replace...
Due to the development of information technology (IT), it has been applied to various fields such as...
Electronic health records (EHR) are a convenient method to exchange medical information of patients ...
Electronic Health Records are typically created and stored in different places, by different healthc...
Active and responsible involvement of patients in their own health is accepted as an important contr...
Abstract: Problem statement: It is important to secure the transmission of patient’s EHR in remote h...
An increasing amount of personal data is automatically gathered on servers by administrations, hospi...
In such an unfortunate situation of a medical emergency, a lot of people tend to lose their lives wh...
© 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish th...
The goal of this chapter is to discuss the challenges of generic security protocols and platforms fo...
Chapter IXDuring the last decade, many countries launched ambitious Electronic Health Record (EHR) p...
International audienceDuring the past decade, many countries launched ambitious Electronic Health Re...
Paper-based folders have been widely used to coordinate cares in medical-social networks, but they i...
International audiencePaper-based folders have been widely used to coordinate cares in medical-socia...
Medical records have been moving from paper-based systems to electronic form in recent decades. This...
With the development of online services, the traditional paper-based healthcare services are replace...
Due to the development of information technology (IT), it has been applied to various fields such as...
Electronic health records (EHR) are a convenient method to exchange medical information of patients ...
Electronic Health Records are typically created and stored in different places, by different healthc...
Active and responsible involvement of patients in their own health is accepted as an important contr...
Abstract: Problem statement: It is important to secure the transmission of patient’s EHR in remote h...
An increasing amount of personal data is automatically gathered on servers by administrations, hospi...
In such an unfortunate situation of a medical emergency, a lot of people tend to lose their lives wh...
© 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish th...
The goal of this chapter is to discuss the challenges of generic security protocols and platforms fo...