Identity and access management systems
This chapter discusses concepts and various research-oriented IAM techniques for growing connected healthcare system. Identity and access management (IAM) in a computer system includes a security framework, tools, and technologies to control access to critical information resources to legitimate users in the right context. IAM is even more challenging for healthcare organization as they are responsible for the protection of users identities and valuable medical records. Health care organizations are more prone to attacks than financial institutions. Data breaches in e-healthcare can lead to identifying theft, billing, and insurance frauds. To prevent such breaches IAM for health care must be even more secure and scalable to meet current challenges. IAM cannot be explained without learning the concept of identification.
Identity and access management systems, Page 1 of 2
< Previous page Next page > /docserver/preview/fulltext/books/he/pbhe020e/PBHE020E_ch4-1.gif /docserver/preview/fulltext/books/he/pbhe020e/PBHE020E_ch4-2.gif