Your browser does not support JavaScript!

Healthcare models and algorithms for privacy and security in healthcare records

Healthcare models and algorithms for privacy and security in healthcare records

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Security and Privacy of Electronic Healthcare Records: Concepts, paradigms and solutions — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The objective of this paper is to discuss three major approaches, namely Data Storage, Data Access, and Data Authentication with regard to electronic healthcare records so that patient's records are kept safe and follow Confidentiality, Integrity, and Availability principle. The chapter also focuses on the various algorithms that are connected to above three approaches with regard to maintaining security and privacy in healthcare IT.

Chapter Contents:

  • 8.1 Introduction to data security in healthcare
  • 8.2 Healthcare overview
  • 8.2.1 Healthcare evolution
  • 8.2.2 Healthcare information security
  • 8.2.3 Need to implement privacy in healthcare data and information
  • 8.2.4 Health security as a public health concept
  • 8.3 Security issues in healthcare data and information
  • 8.4 Models for healthcare security
  • 8.4.1 RBAC healthcare model
  • 8.4.2 Task role-based access control model
  • 8.4.3 HL7 role-based access control model
  • 8.4.4 Attribute role-based access control model
  • 8.4.5 Privacy access control model for e-healthcare service
  • 8.4.6 TMAC model
  • T-TMAC model
  • C-TMAC model
  • 8.4.7 Security model for healthcare in cloud computing
  • 8.4.8 Security model for healthcare in big data
  • 8.4.9 Security model for healthcare in wireless sensor network
  • 8.4.10 HIPAA privacy rules
  • 8.5 Introduction to algorithms for security and privacy of healthcare system
  • 8.6 Data storage security
  • 8.6.1 Threat analysis
  • 8.7 Data access security
  • 8.7.1 Public key cryptography
  • 8.7.2 Data sharing security
  • 8.8 Authentication
  • 8.9 Conclusion
  • 8.10 Future scope
  • References

Inspec keywords: electronic health records; data privacy; security of data; health care

Other keywords: healthcare algorithms; integrity principle; confidentiality principle; data access; availability principle; data authentication; healthcare records; data storage; healthcare IT; healthcare models

Subjects: Medical administration; Data security

Preview this chapter:
Zoom in

Healthcare models and algorithms for privacy and security in healthcare records, Page 1 of 2

| /docserver/preview/fulltext/books/he/pbhe020e/PBHE020E_ch8-1.gif /docserver/preview/fulltext/books/he/pbhe020e/PBHE020E_ch8-2.gif

Related content

This is a required field
Please enter a valid email address