e-Health Security Context Management Service

被引:0
|
作者
Liu, W. [1 ]
Park, E. K. [2 ,3 ]
Zhu, S. S. [4 ]
机构
[1] Georgia Gwinnett Coll, Sch Sci & Technol, Lawrenceville, GA 30043 USA
[2] Calif State Univ Chico, Res, Chico, CA 95929 USA
[3] Calif State Univ Chico, Grad Studies, Chico, CA 95929 USA
[4] Shangtou Univ, Dept Comp Sci, Shantou, Peoples R China
关键词
e-Health Mandates; Context Service Management; Cross-Layer Design; Conformance Testing; e-Health CE; e-Health BA; e-Health Compliance; Availability and Quality;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the looming urgency of e-Health technology mandated certification, privacy protection implementation and e-Health reporting in the year of 2014, service providers have to conform to the latest e-Health regulations (i.e., the "Final Rules of 2014") in the United States. We investigated the Service Context Management Solution for both the CE (Covered Entity) and BA (Business Associate) roles as required. Utilizing a cross-layer design we enable full support of the application layer context management service with immediate routing flow selections, safety control and quality assurance in order to address security, availability and quality. This research has provided the much needed design guidelines for numerous e-health networks and IT service vendors in their struggle to supply satisfactory solutions for compliance purpose.
引用
收藏
页码:379 / 383
页数:5
相关论文
共 50 条
  • [41] A Security and Privacy Survey for WSN in e-Health Applications
    Cosio Leon, Maria de los Angeles
    Nieto Hipolito, Juan Ivan
    Luna Garcia, Jesus
    CERMA: 2009 ELECTRONICS ROBOTICS AND AUTOMOTIVE MECHANICS CONFERENCE, 2009, : 125 - +
  • [42] A Security Assessment Framework for e-Health: A Croatian Perspective
    Belani, Hrvoje
    Ljubi, Igor
    Blaskovic, Bruno
    MEETING SECURITY CHALLENGES THROUGH DATA ANALYTICS AND DECISION SUPPORT, 2016, 47 : 293 - 300
  • [43] On the privacy and security for e-health services in the metaverse: An overview
    Letafati, Mehdi
    Otoum, Safa
    AD HOC NETWORKS, 2023, 150
  • [44] Comparing approaches for advanced e-health security infrastructures
    Blobel, Bernd
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2007, 76 (5-6) : 454 - 459
  • [45] Security Aspects of e-Health Systems Migration to the Cloud
    Michalas, Antonis
    Paladi, Nicolae
    Gehrmann, Christian
    2014 IEEE 16TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM), 2014, : 212 - 218
  • [46] Highly Assured Safety and Security of e-Health Applications
    Khan, Muhammad Taimoor
    Serpanos, Dimitrios
    Shrobe, Howard
    2018 14TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB 2018), 2018, : 137 - 144
  • [47] Blockchain Survey for Security and Privacy in the e-Health Ecosystem
    Boughdiri, Maher
    Abdellatif, Takoua
    Abdellatif, Tesnim
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2022, 2023, 13857 : 69 - 84
  • [48] Biometrics Applications in e-Health Security: A Preliminary Survey
    Okoh, Ebenezer
    Awad, Ali Ismail
    HEALTH INFORMATION SCIENCE (HIS 2015), 2015, 9085 : 92 - 103
  • [49] Analysis of Privacy and Security Challenges in e-Health Clouds
    Alanazi, Reem
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (09) : 484 - 489
  • [50] IMPROVING E-HEALTH SECURITY THROUGH TRUST NEGOTIATION
    Elkhodr, Mahmoud
    Shahrestani, Seyed
    Cheung, Hon
    ICSOFT 2011: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATABASE TECHNOLOGIES, VOL 1, 2011, : 172 - 177