Chapter IXDuring the last decade, many countries launched ambitious Electronic Health Record (EHR) programs with the objective to increase the quality of care while decreasing its cost. Pervasive healthcare aims itself at making healthcare information securely available anywhere and anytime, even in disconnected environments (e.g., at patient home). Current server-based EHR solutions badly tackle disconnected situations and fail in providing ultimate security guarantees for the patients. The solution proposed in this chapter capitalizes on a new hardware device combining a secure microcontroller (similar to a smart card chip) with a large external Flash memory on a USB key form factor. Embedding the patient folder as well as a database syst...
Electronic Health Records (EHR) serve as a solid documentation of health transactions and as a vital...
After two recent security attacks against implantable medical devices (IMDs) have been reported, the...
The goal of this chapter is to discuss the challenges of generic security protocols and platforms fo...
Chapter IXDuring the last decade, many countries launched ambitious Electronic Health Record (EHR) p...
During the last decade, many countries launched ambitious Electronic Health Record (EHR) programs wi...
International audienceDuring the past decade, many countries launched ambitious Electronic Health Re...
Paper-based folders have been widely used to coordinate cares in medical-social networks, but they i...
International audiencePaper-based folders have been widely used to coordinate cares in medical-socia...
Medical records have been moving from paper-based systems to electronic form in recent decades. This...
Electronic health records (EHR) are a convenient method to exchange medical information of patients ...
An increasing amount of personal data is automatically gathered on servers by administrations, hospi...
With the development of online services, the traditional paper-based healthcare services are replace...
Due to the development of information technology (IT), it has been applied to various fields such as...
Active and responsible involvement of patients in their own health is accepted as an important contr...
Electronic Health Records are typically created and stored in different places, by different healthc...
Electronic Health Records (EHR) serve as a solid documentation of health transactions and as a vital...
After two recent security attacks against implantable medical devices (IMDs) have been reported, the...
The goal of this chapter is to discuss the challenges of generic security protocols and platforms fo...
Chapter IXDuring the last decade, many countries launched ambitious Electronic Health Record (EHR) p...
During the last decade, many countries launched ambitious Electronic Health Record (EHR) programs wi...
International audienceDuring the past decade, many countries launched ambitious Electronic Health Re...
Paper-based folders have been widely used to coordinate cares in medical-social networks, but they i...
International audiencePaper-based folders have been widely used to coordinate cares in medical-socia...
Medical records have been moving from paper-based systems to electronic form in recent decades. This...
Electronic health records (EHR) are a convenient method to exchange medical information of patients ...
An increasing amount of personal data is automatically gathered on servers by administrations, hospi...
With the development of online services, the traditional paper-based healthcare services are replace...
Due to the development of information technology (IT), it has been applied to various fields such as...
Active and responsible involvement of patients in their own health is accepted as an important contr...
Electronic Health Records are typically created and stored in different places, by different healthc...
Electronic Health Records (EHR) serve as a solid documentation of health transactions and as a vital...
After two recent security attacks against implantable medical devices (IMDs) have been reported, the...
The goal of this chapter is to discuss the challenges of generic security protocols and platforms fo...