This document summarizes the design and development of a secure electronic health record (EHR) system that incorporates AES encryption. The system was designed using formal software engineering and database development methodologies. Key aspects of the design include defining entity relationships in an ER diagram, normalizing database tables, and implementing user authentication and encryption of sensitive data. The system provides role-based access and allows physicians, nurses and staff to securely view and update patient records.
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
Information and communication technology (ICT) are becoming a natural part in healthcare. Instead of keeping patient information inside a written file, you can find all information stored in an organized database as well defined files using a specific system in almost every hospital. But those files sometimes got lost or information was split up in files in different hospitals or different departments so no one could see the whole picture from this point we come up with our idea. One of this paper targets is to keep that information available on the cloud so doctors and nurses can have an access to patient record everywhere, so patient history will be clear which helps doctors in giving the right decision. We present security architecture for establishing privacy domains in e-Health bases. In this case, we will improve the availability of medical data and provide the ability for patients to moderate their medical data. Moreover, e-Health system in cloud computing has more than one component to be attacked. The other target of this paper is to distinguish between different kinds of attackers and we point out several shortcomings of current e-Health solutions and standards, particularly they do not address the client platform security, which is a crucial aspect for the overall security of systems in cloud. To fill this gap, we present security architecture for establishing privacy domains in e-Health infrastructures. Our solution provides client platform security and appropriately combines this with network security concepts.
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATIONijdpsjournal
There is a need of data integration in cloud – based system, we propose an Information Integration and Informatics framework for cloud – based healthcare application. The data collected by the Electronic Health Record System need to be smart and connected, so we use informatica for the connection of data
from different database. Traditional Electronic Health Record Systems are based on different technologies, languages and Electronic Health Record Standards. Electronic Health Record System stores data based on interaction between patient and provider. There are scalable cloud infrastructures, distributed and heterogeneous healthcare systems and there is a need to develop advanced healthcare application. This advance healthcare application will improve the integration of required data and helps in fast interaction between the patient and the service providers. Thus there is the development of smart
and connected data in healthcare application of cloud. The proposed system is developed by using cloud platform Aneka.
For more course tutorials visit
www.tutorialrank.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CSEC 610 Project 3 Assessing Information System Vulnerabilities and Risk
For more classes visit
www.snaptutorial.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CSEC 610 Project 3 Assessing Information System Vulnerabilities and Risk
CSEC 610 Project 4 Threat Analysis and Exploitation
CSEC 610 Project 5 Cryptography
For more classes visit
www.snaptutorial.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
For more classes visit
www.snaptutorial.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CSEC 610 Project 3 Assessing Information System Vulnerabilities and Risk
CSEC 610 Project 4 Threat Analysis and Exploitation
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
Information and communication technology (ICT) are becoming a natural part in healthcare. Instead of keeping patient information inside a written file, you can find all information stored in an organized database as well defined files using a specific system in almost every hospital. But those files sometimes got lost or information was split up in files in different hospitals or different departments so no one could see the whole picture from this point we come up with our idea. One of this paper targets is to keep that information available on the cloud so doctors and nurses can have an access to patient record everywhere, so patient history will be clear which helps doctors in giving the right decision. We present security architecture for establishing privacy domains in e-Health bases. In this case, we will improve the availability of medical data and provide the ability for patients to moderate their medical data. Moreover, e-Health system in cloud computing has more than one component to be attacked. The other target of this paper is to distinguish between different kinds of attackers and we point out several shortcomings of current e-Health solutions and standards, particularly they do not address the client platform security, which is a crucial aspect for the overall security of systems in cloud. To fill this gap, we present security architecture for establishing privacy domains in e-Health infrastructures. Our solution provides client platform security and appropriately combines this with network security concepts.
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATIONijdpsjournal
There is a need of data integration in cloud – based system, we propose an Information Integration and Informatics framework for cloud – based healthcare application. The data collected by the Electronic Health Record System need to be smart and connected, so we use informatica for the connection of data
from different database. Traditional Electronic Health Record Systems are based on different technologies, languages and Electronic Health Record Standards. Electronic Health Record System stores data based on interaction between patient and provider. There are scalable cloud infrastructures, distributed and heterogeneous healthcare systems and there is a need to develop advanced healthcare application. This advance healthcare application will improve the integration of required data and helps in fast interaction between the patient and the service providers. Thus there is the development of smart
and connected data in healthcare application of cloud. The proposed system is developed by using cloud platform Aneka.
For more course tutorials visit
www.tutorialrank.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CSEC 610 Project 3 Assessing Information System Vulnerabilities and Risk
For more classes visit
www.snaptutorial.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CSEC 610 Project 3 Assessing Information System Vulnerabilities and Risk
CSEC 610 Project 4 Threat Analysis and Exploitation
CSEC 610 Project 5 Cryptography
For more classes visit
www.snaptutorial.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
For more classes visit
www.snaptutorial.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CSEC 610 Project 3 Assessing Information System Vulnerabilities and Risk
CSEC 610 Project 4 Threat Analysis and Exploitation
For more course tutorials visit
www.tutorialrank.com
CST 610 Project 1 Information Systems and Identity Management
CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CST 610 Project 3 Assessing Information System Vulnerabilities and Risk
CYB 610 Project 1 Information Systems and Identity Management
CYB 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CYB 610 Project 3 Assessing Information System Vulnerabilities and Risk
CYB 610 Project 4 Threat Analysis and Exploitation
For more course tutorials visit
www.tutorialrank.com
CYB 610 Project 1 Information Systems and Identity Management
CYB 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CYB 610 Project 3 Assessing Information System Vulnerabilities and Risk
Health Data Share Service System using RESTtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Survey of open source health information systemshiij
Due to the Health Information Technology for Economic and Clinical Health Act (HITECH), the US
medical industry has been given a directive to transition to electronic health records. Electronic Health
Records will enhance efficiency and quality of patient care. In this paper, open-source health information
systems are surveyed.These systems include electronic medical records, electronic health records and
personal health record systems. Their functionality, implementation technologies used, and security
features are discussed.
Speeding up Healthcare Application with HTTP/2CitiusTech
Healthcare data is being increasingly accessed over the public internet. With the rapid adoption of EHRs and patient portals, more and more healthcare technology providers are looking at providing the same features over the internet in a SaaS model to reduce feature to market time. As they embrace trends and begin supporting new use cases such as wearables, mobile health, AI and chat bots, more data gets transferred over the same public internet infrastructure
Secondly, there is a pressing need to optimize the time healthcare professionals spend on IT per patient instead of patient care. Hence, getting timely and accurate information is of utmost importance to ensure better patient care.
Patient engagement initiatives such as patient education, medication and visit reminder, positively impact patient outcomes and are a huge success if the applications built for the same provide seamless user experience. Internet based applications rely on HTTP. As web application became more prevalent, inefficiencies of HTTP need to be addressed. HTTP/2 (Hypertext Transfer Protocol Version 2) is the update to HTTP protocol that has been built with the aim of improving performance and reducing end user perceived latency, reducing network and server resource usage.This document introduces the features and benefits of HTTP/2 and how you can start using HTTP/2
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR systems in health care sector. The paper is discussing a cloud based patient health record management scheme which is highly secured. In this approach, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing using a single data query submitted by the data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content. Dinesh Soni | Dr. Lakshmi JVN "Personal Health Record over Encrypted Data Using Cloud Service" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41230.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41230/personal-health-record-over-encrypted-data-using-cloud-service/dinesh-soni
Cloud assisted privacy preserving and data integrity for mobile health monito...eSAT Journals
Abstract
In cloud computing system ,data is stimulated to a distantly placed cloud server. Cloud provisions the information authentically and go back to the proprietor whenever wanted. But there is no assurance that information store in the cloud is protected and not changed by cloud . In order to defeat the danger of honesty of data, the user must be able to use the help of Third party Auditor(TPA).TPA has understanding in inspection honesty of the information, that clouds users does not have, and that is difficult for the owner to check .The data in the cloud should be exact ,reliable ,available and elevated excellence.[1]This paper is to address this important problem related to the data integrity and design a cloud assisted privacy preserving mobile-health monitoring system to protect the privacy of the involved parties and their data. for that purpose we have used the algorithms:1)Tate pairing 2)Token generation 3)AES(Advanced Encryption Standards)-SHA1 and MD5.
Keywords— Data integrity,TPA,Tate pairing, Cryptography
Cloud Compliance with Encrypted Data – Health Recordsijtsrd
several tending organizations area unit mistreatment electronic health record EHRS area unit period, patient centered records that create data accessible instantly and firmly to approved users. so information storage becomes associate evoking interest for developing EHRS systems. this can not price an excellent deal however it additionally provides the adjustable giant space mobile access more and more required within the gift world, however, before cloud based EHRSs system will become associate beingness, problems with information security, personal details of patients and overall performance should be shown. As normal cryptography techniques for EHRSs cause hyperbolic access management and performance overhead, this paper proposes the employment of Cipher text Policy Attribute Based cryptography CPABE to encrypted information is unbroken confidential although the storage server is untrusted EHRSs supported health care suppliers credentials to decipher EHRSs it ought to contain these several attributes required for correct access . the planning and usage of cloud related EHRS system supported CP ABE area unit galvanized and bestowed, beside introductory experiments to research the flexibleness and measurability of the planned approach. Mohan Prakash | Nachappa S "Cloud Compliance with Encrypted Data – Health Records" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30773.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/30773/cloud-compliance-with-encrypted-data-%E2%80%93-health-records/mohan-prakash
Cloud computing as an emerging computing mode can be applied to the District Medical Data Center. This is a new proposal raised in the paper. The rudiment of District Medical Data Center based on cloud computing is established. A comparison is made between the samples from the rudiment and the samples from the general systems.
One of the main objective of HIPAA (Health Insurance Portability and Accountability Act) legislation is to provide data privacy and security provisions for safeguarding medical information. It requires healthcare organizations to ensure that applications are secure, and sensitive patient data is protected when in use, during transmission or when stored in a mobile device
A technology company that provides state-of-art Web-based Healthcare Ecosystem platform, first of its kind. We are not just a software company — rather, we provide technology-enabled services that are changing healthcare from a combination of innovative technologies.
There are variety of different software solutions available on the market that provide separate and individual solutions. Aptuso Health is the first Healthcare Ecosystem. Web based, fully-integrated, easy to use, scalable Turn Key Solution.
SURVEY OF OPEN SOURCE HEALTH INFORMATION SYSTEMS hiij
Due to the Health Information Technology for Economic and Clinical Health Act (HITECH), the US
medical industry has been given a directive to transition to electronic health records. Electronic Health
Records will enhance efficiency and quality of patient care. In this paper, open-source health information
systems are surveyed.These systems include electronic medical records, electronic health records and
personal health record systems. Their functionality, implementation technologies used, and security
features are discussed.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
A framework for secure healthcare systems based on big data analytics in mobi...ijasa
In this paper we introduce a framework for Healthcare Information Systems (HISs) based on big data
analytics in mobile cloud computing environments. This framework provides a high level of integration,
interoperability, availability and sharing of healthcare data among healthcare providers, patients, and
practitioners. Electronic Medical Records (EMRs) of patients dispersed among different Care Delivery
Organizations (CDOs) are integrated and stored in the Cloud storage area, this creates an Electronic
Health Records (EHRs) for each patient. Mobile Cloud allows fast Internet access and provision of EHRs
from anywhere and at any time via different platforms. Due to the massive size of healthcare data, the
exponential increase in the speed in which this data is generated and the complexity of healthcare data
type, the proposed framework employs big data analytics to find useful insights that help practitioners take
critical decisions in the right time. In addition, our proposed framework applies a set of security
constraints and access control that guarantee integrity, confidentiality, and privacy of medical information.
We believe that the proposed framework paves the way for a new generation of lower cost, more efficient
healthcare systems.
For more course tutorials visit
www.tutorialrank.com
CST 610 Project 1 Information Systems and Identity Management
CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CST 610 Project 3 Assessing Information System Vulnerabilities and Risk
CYB 610 Project 1 Information Systems and Identity Management
CYB 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CYB 610 Project 3 Assessing Information System Vulnerabilities and Risk
CYB 610 Project 4 Threat Analysis and Exploitation
For more course tutorials visit
www.tutorialrank.com
CYB 610 Project 1 Information Systems and Identity Management
CYB 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CYB 610 Project 3 Assessing Information System Vulnerabilities and Risk
Health Data Share Service System using RESTtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Survey of open source health information systemshiij
Due to the Health Information Technology for Economic and Clinical Health Act (HITECH), the US
medical industry has been given a directive to transition to electronic health records. Electronic Health
Records will enhance efficiency and quality of patient care. In this paper, open-source health information
systems are surveyed.These systems include electronic medical records, electronic health records and
personal health record systems. Their functionality, implementation technologies used, and security
features are discussed.
Speeding up Healthcare Application with HTTP/2CitiusTech
Healthcare data is being increasingly accessed over the public internet. With the rapid adoption of EHRs and patient portals, more and more healthcare technology providers are looking at providing the same features over the internet in a SaaS model to reduce feature to market time. As they embrace trends and begin supporting new use cases such as wearables, mobile health, AI and chat bots, more data gets transferred over the same public internet infrastructure
Secondly, there is a pressing need to optimize the time healthcare professionals spend on IT per patient instead of patient care. Hence, getting timely and accurate information is of utmost importance to ensure better patient care.
Patient engagement initiatives such as patient education, medication and visit reminder, positively impact patient outcomes and are a huge success if the applications built for the same provide seamless user experience. Internet based applications rely on HTTP. As web application became more prevalent, inefficiencies of HTTP need to be addressed. HTTP/2 (Hypertext Transfer Protocol Version 2) is the update to HTTP protocol that has been built with the aim of improving performance and reducing end user perceived latency, reducing network and server resource usage.This document introduces the features and benefits of HTTP/2 and how you can start using HTTP/2
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR systems in health care sector. The paper is discussing a cloud based patient health record management scheme which is highly secured. In this approach, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing using a single data query submitted by the data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content. Dinesh Soni | Dr. Lakshmi JVN "Personal Health Record over Encrypted Data Using Cloud Service" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41230.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41230/personal-health-record-over-encrypted-data-using-cloud-service/dinesh-soni
Cloud assisted privacy preserving and data integrity for mobile health monito...eSAT Journals
Abstract
In cloud computing system ,data is stimulated to a distantly placed cloud server. Cloud provisions the information authentically and go back to the proprietor whenever wanted. But there is no assurance that information store in the cloud is protected and not changed by cloud . In order to defeat the danger of honesty of data, the user must be able to use the help of Third party Auditor(TPA).TPA has understanding in inspection honesty of the information, that clouds users does not have, and that is difficult for the owner to check .The data in the cloud should be exact ,reliable ,available and elevated excellence.[1]This paper is to address this important problem related to the data integrity and design a cloud assisted privacy preserving mobile-health monitoring system to protect the privacy of the involved parties and their data. for that purpose we have used the algorithms:1)Tate pairing 2)Token generation 3)AES(Advanced Encryption Standards)-SHA1 and MD5.
Keywords— Data integrity,TPA,Tate pairing, Cryptography
Cloud Compliance with Encrypted Data – Health Recordsijtsrd
several tending organizations area unit mistreatment electronic health record EHRS area unit period, patient centered records that create data accessible instantly and firmly to approved users. so information storage becomes associate evoking interest for developing EHRS systems. this can not price an excellent deal however it additionally provides the adjustable giant space mobile access more and more required within the gift world, however, before cloud based EHRSs system will become associate beingness, problems with information security, personal details of patients and overall performance should be shown. As normal cryptography techniques for EHRSs cause hyperbolic access management and performance overhead, this paper proposes the employment of Cipher text Policy Attribute Based cryptography CPABE to encrypted information is unbroken confidential although the storage server is untrusted EHRSs supported health care suppliers credentials to decipher EHRSs it ought to contain these several attributes required for correct access . the planning and usage of cloud related EHRS system supported CP ABE area unit galvanized and bestowed, beside introductory experiments to research the flexibleness and measurability of the planned approach. Mohan Prakash | Nachappa S "Cloud Compliance with Encrypted Data – Health Records" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30773.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/30773/cloud-compliance-with-encrypted-data-%E2%80%93-health-records/mohan-prakash
Cloud computing as an emerging computing mode can be applied to the District Medical Data Center. This is a new proposal raised in the paper. The rudiment of District Medical Data Center based on cloud computing is established. A comparison is made between the samples from the rudiment and the samples from the general systems.
One of the main objective of HIPAA (Health Insurance Portability and Accountability Act) legislation is to provide data privacy and security provisions for safeguarding medical information. It requires healthcare organizations to ensure that applications are secure, and sensitive patient data is protected when in use, during transmission or when stored in a mobile device
A technology company that provides state-of-art Web-based Healthcare Ecosystem platform, first of its kind. We are not just a software company — rather, we provide technology-enabled services that are changing healthcare from a combination of innovative technologies.
There are variety of different software solutions available on the market that provide separate and individual solutions. Aptuso Health is the first Healthcare Ecosystem. Web based, fully-integrated, easy to use, scalable Turn Key Solution.
SURVEY OF OPEN SOURCE HEALTH INFORMATION SYSTEMS hiij
Due to the Health Information Technology for Economic and Clinical Health Act (HITECH), the US
medical industry has been given a directive to transition to electronic health records. Electronic Health
Records will enhance efficiency and quality of patient care. In this paper, open-source health information
systems are surveyed.These systems include electronic medical records, electronic health records and
personal health record systems. Their functionality, implementation technologies used, and security
features are discussed.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
A framework for secure healthcare systems based on big data analytics in mobi...ijasa
In this paper we introduce a framework for Healthcare Information Systems (HISs) based on big data
analytics in mobile cloud computing environments. This framework provides a high level of integration,
interoperability, availability and sharing of healthcare data among healthcare providers, patients, and
practitioners. Electronic Medical Records (EMRs) of patients dispersed among different Care Delivery
Organizations (CDOs) are integrated and stored in the Cloud storage area, this creates an Electronic
Health Records (EHRs) for each patient. Mobile Cloud allows fast Internet access and provision of EHRs
from anywhere and at any time via different platforms. Due to the massive size of healthcare data, the
exponential increase in the speed in which this data is generated and the complexity of healthcare data
type, the proposed framework employs big data analytics to find useful insights that help practitioners take
critical decisions in the right time. In addition, our proposed framework applies a set of security
constraints and access control that guarantee integrity, confidentiality, and privacy of medical information.
We believe that the proposed framework paves the way for a new generation of lower cost, more efficient
healthcare systems.
CSEC 610 Effective Communication - snaptutorial.comdonaldzs7
For more classes visit
www.snaptutorial.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
FOR MORE CLASSES VISIT
www.cst610rank.com
CST 610 Project 1 Information Systems and Identity Management CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux) CST 610 Project 3 Assessing Information System Vulnerabilities and Risk CST 610 Project 4 Threat Analysis and Exploitation CST 610 Project 5 Cryptography CST 610 Project 6 Digital Forensics Analysis
Chapter 12 Page 209Discussion Questions 2. How does a d.docxcravennichole326
Chapter 12 Page 209
Discussion Questions
2. How does a data dictionary influence the design and implementation of an EHR? How does the data dictionary enhance and restrict the EHR?
3. In what circumstances might a clinical infrastructure based on either third-party service providers or mobile applications be desirable? What cautions would we place on these technologies in the same circumstances?
Chapter 12 Page 209
Discussion Questions
2. How does a data dictio
nary influence the design and implementation of an EHR? How does the data
dictionary enhance and restrict the EHR?
3. In what circumstances might a clinical infrastructure based on either third
-
party service providers
or mobile applications be desirabl
e? What cautions would we place on these technologies in the same
circumstances?
Chapter 12 Page 209
Discussion Questions
2. How does a data dictionary influence the design and implementation of an EHR? How does the data
dictionary enhance and restrict the EHR?
3. In what circumstances might a clinical infrastructure based on either third-party service providers
or mobile applications be desirable? What cautions would we place on these technologies in the same
circumstances?
Chapter 12 Technical Infrastructure to Support Healthcare
Scott P. Narus
No single off-the-shelf system today can support all needs of the healthcare environment. Therefore it is critical that the technical architecture be capable of supporting multiple system connections and data interoperability.
Objectives
At the completion of this chapter the reader will be prepared to:
1.Describe the key technical components of electronic health records and their interrelationships
2.Define interoperability and its major elements
3.Contrast networking arrangements such as regional health information organizations (RHIOs), health information exchanges (HIEs), and health information organizations (HIOs)
4.Provide information about newer technical models such as cloud computing and application service providers (ASPs)
5.Synthesize current challenges for informatics infrastructure
Key Terms
Application service provider (ASP), 205
Architecture, 197
Clinical data repository (CDR), 198
Cloud computing, 205
Data dictionary, 201
Health information organization (HIO), 204
Infrastructure, 197
Interface engine (IE), 203
Knowledge base, 202
Master person index (MPI), 199
Regional Health Information Organization (RHIO), 204
Service-oriented architecture (SOA), 207
Abstract
This chapter introduces the technical aspects of electronic health records (EHRs) and the current infrastructure components. Complementing the functional components discussed elsewhere, this chapter introduces terms such as clinical data repository, master person index, interface engine, and data dictionary and other technical components necessary for EHRs to function. Recent material about national efforts related to the infrastructure and electroni ...
FOR MORE CLASSES VISIT
www.cst610rank.com
CST 610 Project 1 Information Systems and Identity Management CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux) CST 610 Project 3 Assessing Information System Vulnerabilities and Risk CST 610 Project 4 Threat Analysis and Exploitation CST 610 Project
For more classes visit
www.snaptutorial.com
CST 610 Project 1 Information Systems and Identity Management
CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CST 610 Project 3 Assessing Information System Vulnerabilities and Risk
CST 610 Project 4 Threat Analysis and Exploitation
CST 610 Effective Communication - snaptutorial.comdonaldzs7
For more classes visit
www.snaptutorial.com
CST 610 Project 1 Information Systems and Identity Management
CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CST 610 Project 3 Assessing Information System Vulnerabilities and Risk
FOR MORE CLASSES VISIT
www.cst610rank.com
CST 610 Project 1 Information Systems and Identity Management
CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CST 610 Project 3 Assessing Information System Vulnerabilities and Risk
CST 610 Project 4 Threat Analysis and Exploitation
CST 610 Project 5 Cryptography
For more classes visit
www.snaptutorial.com
CYB 610 Project 1 Information Systems and Identity Management
CYB 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CYB 610 Project 3 Assessing Information System Vulnerabilities and Risk
CYB 610 Project 4 Threat Analysis and Exploitation
CYB 610 Effective Communication - snaptutorial.comdonaldzs9
For more classes visit
www.snaptutorial.com
CYB 610 Project 1 Information Systems and Identity Management
CYB 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
FOR MORE CLASSES VISIT
www.cst610rank.com
CST 610 Project 1 Information Systems and Identity Management CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux) CST 610 Project 3 Assessing Information System Vulnerabilities and Risk CST 610 Project 4 Threat Analysis and Exploitation CST 610 Project 5 Cryptography CST 610 Project 6 Digital Forensics Analysis
For more classes visit
www.snaptutorial.com
CYB 610 Project 1 Information Systems and Identity Management
CYB 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CYB 610 Project 3 Assessing Information System Vulnerabilities and Risk
CYB 610 Project 4 Threat Analysis and Exploitation
CYB 610 Project 5 Cryptography
CYB 610 Project 6 Digital Forensics Analysis
Top 5 Indian Style Modular Kitchen DesignsFinzo Kitchens
Get the perfect modular kitchen in Gurgaon at Finzo! We offer high-quality, custom-designed kitchens at the best prices. Wardrobes and home & office furniture are also available. Free consultation! Best Quality Luxury Modular kitchen in Gurgaon available at best price. All types of Modular Kitchens are available U Shaped Modular kitchens, L Shaped Modular Kitchen, G Shaped Modular Kitchens, Inline Modular Kitchens and Italian Modular Kitchen.
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...Mansi Shah
This study examines cattle rearing in urban and rural settings, focusing on milk production and consumption. By exploring a case in Ahmedabad, it highlights the challenges and processes in dairy farming across different environments, emphasising the need for sustainable practices and the essential role of milk in daily consumption.
Hello everyone! I am thrilled to present my latest portfolio on LinkedIn, marking the culmination of my architectural journey thus far. Over the span of five years, I've been fortunate to acquire a wealth of knowledge under the guidance of esteemed professors and industry mentors. From rigorous academic pursuits to practical engagements, each experience has contributed to my growth and refinement as an architecture student. This portfolio not only showcases my projects but also underscores my attention to detail and to innovative architecture as a profession.
Expert Accessory Dwelling Unit (ADU) Drafting ServicesResDraft
Whether you’re looking to create a guest house, a rental unit, or a private retreat, our experienced team will design a space that complements your existing home and maximizes your investment. We provide personalized, comprehensive expert accessory dwelling unit (ADU)drafting solutions tailored to your needs, ensuring a seamless process from concept to completion.
Book Formatting: Quality Control Checks for DesignersConfidence Ago
This presentation was made to help designers who work in publishing houses or format books for printing ensure quality.
Quality control is vital to every industry. This is why every department in a company need create a method they use in ensuring quality. This, perhaps, will not only improve the quality of products and bring errors to the barest minimum, but take it to a near perfect finish.
It is beyond a moot point that a good book will somewhat be judged by its cover, but the content of the book remains king. No matter how beautiful the cover, if the quality of writing or presentation is off, that will be a reason for readers not to come back to the book or recommend it.
So, this presentation points designers to some important things that may be missed by an editor that they could eventually discover and call the attention of the editor.
2. 204 Ebru Celikel Cankaya and Than Kywe / Procedia Computer Science 62 (2015) 203 – 212
A healthcare system is much complicated and comprehensive as it involves many aspects from hospital
management to staff tracking. We focus particularly on patient record manipulation, as even this concentration is
sufficiently complex to provide a comprehensive analysis of data, database design, and implementation steps.
2. RELATED WORK
The need for a comprehensive electronic health record (EHR)system is pervasive, explaining the reason why there
are many implementations as mentioned in [6, 7, 8, 9, 10]. Yet, each implementation focuses mainly on certain
aspects while disregarding the others due to such factors as time, performance, number of users, user acceptance, and
state or nationwide policies [3, 11, 12, 13, 14, 15, 16]. Actually, considering an EHR w.r.t. each factor listed above
could be a topic of research itself, and is beyond the scope of this paper.
In [6], Lien et al. introduce an EHR system similar to our work. Additionally, our design integrates security to the
EHR system by incorporating cryptology. When a user logs into the system, our system first checks the username in
the backend database. If found, then corresponding encrypted password is retrieved from database and is decrypted.
Next the user entered password is compared with the decrypted password. If they match, the password is valid and
the system proceeds by checking the user permission level to grant appropriate access. Otherwise, the access is
denied. [7] presents another EHR system designed to use for several types of databases with mobile applications via
j2se program. However, this work also is missing a cryptography feature. The main advantage of our design is that
we apply java cryptography architecture throughout so as to store all security sensitive data in the form of a cipher.
When we retrieve this sensitive data from database, we decrypt it based on the user access level.
Other similar EHR system applications utilize different underlying infrastructure for the operating systems, as well
as the database. For example, [17] designs an EHR for web based and mobile platforms, which runs on a Linux
(Ubuntu 10.04) operating system with MySql database and ApacheTomcat. Our design runs on a newer version of
Linux (Ubuntu 13.10) with Oracle 10g database.
Observing patient privacy is the fundamental requirement that an EHR system should possess. And many EHR
system designs practice privacy preservation through HIPPA policy that remains only at the database level [18].
While manipulating sensitive patient records within database level as other similar systems do, our system extends
secure data handling to user interaction level as well.
The concern to provide and maintain security of sensitive patient data is the main concentration of our system. For
this, we adopt a multi-tiered architecture where the main ideology is to protect data anywhere at any time. This
simply means that data must be protected whether it is stored in a database server or in the cloud; or is interacting
with users in any means²from client computer, or from the web browser, or from mobile devices.
3. SYSTEM DESIGN AND DEVELOPMENT
The overall diagram of our design is illustrated in
Figure 1 below.
Figure 1.Overall system schema for the EHR design.
3. 205
Ebru Celikel Cankaya and Than Kywe / Procedia Computer Science 62 (2015) 203 – 212
As can be seen from Figure 1, there are five essential components in our design: The User interface provides a GUI
based interaction with the end user who is either a physician, or a nurse. The JDBC API offers database connection
services, while Swing API supports the GUI services. The Java Crypto API is employed to complement the
application with AES symmetric encryption. The last component is the Oracle database that lies at the bottom of the
abstraction hierarchy to store patient data records, as well as encrypted content, such as user login data, disease
categories, physician information, and patient records for visits and treatment.
The formal categorization and definition of the entities in our design are listed as follows:
x Patient: Subject of medical records (or agent).
x Patient health data: Data about patient's health or treatment enabling identification of patient.
x Healthcare provider: Mostly the physician, who has access to personal health information. The other type
of a provider is nurse.
x Medical Office Staff: The staff of the healthcare center that help manage and maintain information
regarding healthcare providers and patients.
For implementation, we use Netbeans IDE 8.0, JDK 1.7, and Oracle 10g. The reasons behind these choices are
concerns on cost effectiveness, as well as performance. We see that these choices prove to be well made, as we get
responses from our system with no major problems in a timely manner.
3.1. REQUIREMENTS GATHERING AND ANALYSIS
We start designing our EHR system by gathering the facts and requirements about a generic patient entity first.
From a software engineering perspective, a patient record VKRXOG VWRUH LQIRUPDWLRQ DERXW SDWLHQW¶V LGHQWLW
differentiated by a unique patient id (for this, SSN is used), address, contact phone number, date of birth, gender,
blood type, and a special field to add remarks about the patient.
As for the manipulation of a patient health data, three roles are defined: a physician, a nurse, and a staff member. A
physician can add, modify, or delete his treatment records for a patient. He/she can view the complete treatment
records of the patients assigned to him/her. The patient health data should also be manipulated by a nurse, though
with lesser rights granted this time. Namely, a nurse should be able to add health related treatment record for a
patient. A nurse should also be able to browse the visit history of a patient in a restricted way, which means that a
nurse cannot view the detailed treatment records of physician(s) about a patient. The third role owner, i.e. a staff
PHPEHUFDQYLHZWKHSDWLHQW¶VEDVLFLQIRUPDWLRQUHODWHGWRKLVLGHQWLWDVZHOODVKLVYLVLt date and time, and the
cost of visit. The staff should also be able to track patient wait time, and assign an appropriate and available
healthcare provider to the patient.
In addition to the three roles defined above, the system also introduces an admin role, who is responsible for
defining roles, assigning users to these roles and managing role granting and revocation on a dynamic basis (as
physicians/nurses/staff can be hired, or may leave the job, etc.).
3.2. DESIGN
After initial gathering of facts and requirements completed in Section 3.1., the collected data is further analyzed to
formally define the database tables, fields of each table, primary and foreign key assignments, relationship and
functional dependency definitions.
To exercise the design phase of the formal software engineering approach, we combine it with the formal database
design step that involves the steps described in subsections 3.2.1 through 3.2.4:
3.2.1. ER DIAGRAM
The Entity-relationship (ER) diagram first formally defines and constructs the entities and relationships in the
system, then brings them together with relationships specified.
4. 206 Ebru Celikel Cankaya and Than Kywe / Procedia Computer Science 62 (2015) 203 – 212
Figure 2 shows the overall ER diagram for our EHR system:
Figure 2.ER-Diagram for the EHR design.
As seen in Figure 2, the entities in our EHR design consists of fundamental components, rather than complex
entities; and the relationships are simple accordingly. This is a deliberate design choice to make the process less
complicated and easy to follow for educational purposes.
3.2.2. RELATIONAL DATABASE SCHEMA
The relational database schema given in Figure 3 displays a schematic view of the entities and the cardinalities
associated with each entity.
As we see from Figure 3 the relational database schema illustrates the data type and domain information pertaining
to each entity and relation, where the legend of symbols are listed as follows:
As we see from Figure 3 the relational database schema illustrates the data type and domain information pertaining
to each entity and relation, where the legend of symbols are listed as to indicate primary key, to indicate a non-
nullable field, and to indicate a nullable field.
5. 207
Ebru Celikel Cankaya and Than Kywe / Procedia Computer Science 62 (2015) 203 – 212
Figure 3.Relational database schema.
3.2.3. DATABASE CONSTRAINTS
Cardinality Constraints
Employee-Doctor 1:M
Employee-Nurse 1:M
1:M relationship between Employee and Doctor and Employee and Nurse as a there could be many doctors as
employees, and one doctor can only register once as an employee. The same cardinality applies to the relationship
between Employee and Nurse entities.
Patient-Doctor (M:N)
M:N relationship between Patient and visiting a doctor, as a patient can visit many doctors, and the same doctor can
be visited by many patients.
Doctor manipulates visit history (M:N)
M:N relationship between Doctor and manipulating visit history, as a doctor can manipulate many visit histories,
and the same visit history can be associated with more than one doctor.
Patient has visit history (1:M)
1:M relationship between Patient and having a visit history, as a patient have many visit histories, and the same visit
6. 208 Ebru Celikel Cankaya and Than Kywe / Procedia Computer Science 62 (2015) 203 – 212
history can only belong to one patient.
Key Constraints ± Primary Key (PK)
SSN is the PK in Employee table, , as it uniquely identifies each employee.
DoctorID is the PK in Doctor table, as it uniquely identifies each doctor.
NurseID is the PK in Nurse table, as it uniquely identifies each nurse.
PatientID is the PK in Patient table, as it uniquely identifies each patient.
VisitID is the PK in VisitHistory table, as it uniquely identifies each visit history.
VisitControllerID is the PK in VisitController table, as it uniquely identifies each visit controller.
Referential integrity constraints - Foreign Key (FK)
DoctorID is FK in VisitController.
NurseID is FK in VisitController.
PatientID is FK in VisitController.
VisitID is FK in VisitController.
SSN is FK in Doctor.
SSN is FK in Nurse.
3.2.4. DEPENDENCY DIAGRAMS
Doctor Table: (DoctorID, SSN, Qualifications, Speciality)
Corresponding Relational Schema for the Doctor table in 3NF
Nurse Table: :(NurseID, Qualifications, Speciality)
Corresponding Relational Schema for the Nurse table in 3NF
VisitHistory Table: :(VisitID, VisitDate)
Corresponding Relational Schema for the VisitHistory table in 3NF
7. 209
Ebru Celikel Cankaya and Than Kywe / Procedia Computer Science 62 (2015) 203 – 212
Employee Table:
(SSN, FirstName, LastName, Address, TelNo, Sex, DOB, LoginName, LoginPassword, AccessLevel).
Corresponding Relational Schema for the Employee table in 3NF
Patient Table: (PatientID, SSN,FirstName,LastName, Address, TelNo, Sex, DOB, BloodType, Remarks).
Corresponding Relational Schema for the Patient table in 3NF:
VisitorController Table:
(VisitorControllerID, DoctorID,NurseID, VisitID, PatientID, TreatmentRecord).
Corresponding Relational Schema for the VisitorController table in 3NF:
3.3. IMPLEMENTATION
The implementation section starts with designing GUI for the end users.
The initial login screen seen in Figure 4 below provides a means to collect user credentials for further verification by
checking the already stored encrypted user passwords in the system
Figure 4. Initial login screen and encrypted credentials.
8. 210 Ebru Celikel Cankaya and Than Kywe / Procedia Computer Science 62 (2015) 203 – 212
After a successful login, the user is displayed the main screen of operations in Figure 5 that provides the menu of
options he can do, based on his role in the system:
Figure 5.Admin screen of operations.
The screen displayed in Figure 5 captures the current user name and his role, and displays it together with the access
time in status bar, for log purposes. Based on the role of the user, the functions that can be accessed are different: If
the current user role is physician (Figure 6), then he can access the doctor and patient options from the main menu.
If the current user is a nurse, he can access the nurse and patient options from the main menu. Similarly, if the
current user is a staff, he can access the office admin menu. When the current user is an admin, he can view the log
data regarding who accesses the system at what time, for what purposes.
Figure 6.Physician screen of operations.
The process of patient registration is accomplished by a staff member via following screens in Figure 7:
Figure 7.Main screen of operations.
9. 211
Ebru Celikel Cankaya and Than Kywe / Procedia Computer Science 62 (2015) 203 – 212
The staff member can add, modify, or delete a patient record in the system. Figure 7 shows a partial view of the
patient registration records listed in ascending order of FirstNamecolumn.
The admin can view and check the system login information for error detection purposes. The login information
(Figure 8) is directly associated with the encrypted log file displayed next to it. A symmetric encryption algorithm
AES [19] along with 128 bits is used to encrypt the log file so as to provide the confidentiality of the log file from
unintended third parties. The rationale behind using AES is twofold: Once it is fast (as compared to an asymmetric
encryption algorithm), and also computationally hard to break due to its comparatively large key size (128 bits).
Figure 8.System log data and its encrypted content.
Addressing the patient together with patient health data entries, we create a patient visit records screen as seen in
Figure 9:
Figure 9.Patient visit records.
This screen allows a nurse to add treatment record(s) for a patient, as well as allows him to view the visit history of a
patient in a limited manner (most probably, not to the degree that a physician is granted). The same screen allows a
physician to add treatment record(s) for a patient, and also view the complete treatment records of the patients
assigned to him. A staff member can also view patient basic information together with visit date and time for
tracking purposes. The staff can also assign an available and a matching (meaning a specialist for a particular
disease) health care provider to each patient.
4. CONCLUSION AND FUTURE WORK
We present the design and development of a novel EHR system incorporating two formal development
methodologies as software engineering perspective, together with database development approach. This work
10. 212 Ebru Celikel Cankaya and Than Kywe / Procedia Computer Science 62 (2015) 203 – 212
provides a concrete example that combines these two formal methodologies to design and develop software, and can
be used as an educational guideline to model after for designing similar projects in other domains. As part of future
work, we plan on extending our design to provide an interactive tool that will help user get involved actively in the
design process and self teachits steps.
REFERENCES
1. Rahimi B., Moberg A., Timpka T., Vimarlund V. Implementing an integrated computerized patient record
system: Towards an evidence-based information system implementation practice in healthcare, AMIA 2008.
2. Fitzpatrick G., Ellingsen G. A Review of 25 Years of CSCW Research in Healthcare: Contributions,
Challenges and Future Agendas, Computer Supported Cooperative Work (CSCW), 22(4-6), pp 609-665,
August 2013.
3. Middleton B., Bloomrosen M., Dente M. A, Hashmat B., Koppel R., Overhage J. M., Payne T. H., Rosenbloom
S. T., Weaver C., Zhang J., Enhancing patient safety and quality of care by improving the usability of electronic
health record systems: recommendations from AMIA, Journal of the American Medical Informatics
Assoication, Vol. 20, Issue e1, 2013.
4. http://www.hhs.gov/ocr/privacy/ [Accessed on: 09/05/2014].
5. Hu J., Chen H., Hou T. A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security
regulations. Computer Standards Interfaces 32.5 (2010): 274-280.
6. Lien C., Liu C., Chen Y. Integrating Security Considerations in Client Server Architectures of Health
Information Systems Development. Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS),
2011.
7. Harish, U., Ganesan, R., Design and development of secured m-healthcare system, Advances in Engineering,
Science and Management (ICAESM), pp.470-473, 30-31 March 2012.
8. Greenhalgh T., Hinder S., Stramer K., Bratan T., Russell J. Adoption, non-adoption, and abandonment of a
personal electronic health record: case study of HealthSpace, British Medical Journal, 2010; 341: c5814.
9. Wright A., Sittig D. F., Ash J. S., Feblowitz J., Meltzer S., McMullen C., Guappone K., Carpenter J., Richardson
J., Simonaitis L., Evans R. S., Nichol W. P., Middleton B. Development and evaluation of a comprehensive
clinical decision support taxonomy: comparison of front-end tools in commercial and internally developed
electronic health record systems, Journal of the American Medical Informatics Association, March 2011.
10. Parsons A., McCullough C., Wang J., Shih S. Validity of electronic health record-derived quality
measurement for performance monitoring, Journal of the American Medical Informatics Association,
January 2012.
11. Menachemi N., Collum T. H. Benefits and drawbacks of electronic health record systems, Journal of Risk
Management and Healthcare Policy, 4: 47-55, May 2011.
12. Charles D., Gabriel M., Furukawa M. F. Adoption of Electronic Health Record Systems among U.S. Non-
federal Acute Care Hospitals: 2008-2013 , ONC Data Brief, No. 16, May 2014, USA.
13. Hsiao C., Hing E. Use and Characteristics of Electronic Health Record Systems Among Office-based
Physician Practices: United States, 2001±2013, NCHS Data Brief, No. 143, January 2014.
14. Pendergrass J. C., Heart K., Ranganathan C.,Venkatakrishnan V. N. A. Threat Table Based Approach to
Telemedicine Security, Transactions of the International Conference on Health Information Technology
Advancement, Vol.2 No. 1, 2013.
15. Sunyaev A., Dmitry C. Supporting chronic disease care quality: design and implementation of a health service
and its integration with electronic health records. Journal of Data and Information Quality (JDIQ) 3.2 (2012):
3.
16. Thiong'o K. K., Framework for the Implementation of a Patient Electronic Referral System: Case Study of
Nairobi Province, University of Nairobi, Scientific Conference Proceedings. 2013.
17. Persson M., Tobian A., Johansson P., Goode E., Kruzela I., Johansson O. A new improved distributed e-
healthcare system based on open standards for depression treatment. Proceedings of the 3rd International
Conference on Information and Communication Systems, ACM, 2012.
18. Liu L. S., Shih P. C., Hayes G. R. Barriers to the adoption and use of personal health record systems,
Proceedings of the 2011 iConference, ACM, 2011.
19. Daemen J., Rijmen V. The Design of RijndaeL: AES - The Advanced Encryption Standard (Information
Security and Cryptography), Springer, 2002.