Cryptographic protection of health information: Cost and benefit

被引:6
作者
Biskup, J
Bleumer, G
机构
来源
INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING | 1996年 / 43卷 / 1-2期
关键词
D O I
10.1016/S0020-7101(96)01228-7
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Medical, legal, and economic reasons inevitably force health care establishments to apply more and more open distributed IT systems rather than the less flexible and more expensive mainframes. Managing, for example, electronic patient records by various users at different locations by means of large scale client-server systems requires new security provisions for storing, archiving and communicating those data. Using an analogy, data processing is being changed from railroads to highways. Formerly, only one engine-driver was responsible for the security of a whole train, whereas now the car-drivers themselves are responsible each for his own car. Unless the cars are equipped with suitable security mechanisms like breaks and safety belts this change endangers individuals within and outside the cars. Cryptography provides many of the relevant security mechanisms for open distributed health care IT systems. Indeed, suitable cost effective cryptographic products are available but are rarely found in health care IT systems. The reason is more political than economic: diverging national security interests in the EU have prevented strong security in public telecommunication infrastructures arguing that, e.g. criminals would profit, too. The resulting uncertainty of investments delays the development, standardisation and installation of cryptographic solutions.
引用
收藏
页码:61 / 67
页数:7
相关论文
共 22 条
[1]  
[Anonymous], 1994, LNCS
[2]   Personal model of data: Towards a privacy-oriented information system [J].
Biskup, Joachim ;
Brueggemann, Hans Hermann .
Computers and Security, 1988, 7 (06) :575-597
[3]  
BISKUP J, 1994, P IFIP 13 WORLD COMP, V2, P549
[4]  
BLEUMER G, 1994, INT J BIOMED COMPUT, V35, P139
[5]  
CASTANO S, 1995, DATABASE SECURITY
[6]  
CHAUM D, 1985, COMMUN ACM, V28, P1030, DOI 10.1145/4372.4373
[7]   TOWARD A NATIONAL PUBLIC-KEY INFRASTRUCTURE [J].
CHOKHANI, S .
IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (09) :70-74
[8]  
Cohen F., 1991, Computers & Security, V10, P239, DOI 10.1016/0167-4048(91)90040-K
[9]  
DAVIDA GI, 1989, IEEE S SEC PRIV, P312
[10]  
DESMEDT YG, 1994, EUR T TELECOMMUN, V5, P449