dc.contributor.author | Atuheire Izaara, Ambrose | |
dc.contributor.author | Ssembatya, Richard | |
dc.contributor.author | Kaggwa, Fred | |
dc.date.accessioned | 2021-04-21T14:52:57Z | |
dc.date.available | 2021-04-21T14:52:57Z | |
dc.date.issued | 2018 | |
dc.identifier.citation | Izaara, A. A., Ssembatya, R., & Kaggwa, F. (2018, December). An access control framework for protecting personal electronic health records. In 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC) (pp. 1-6). IEEE. | en_US |
dc.identifier.issn | 978-1-5386-6477-3/18 | |
dc.identifier.uri | http://ir.must.ac.ug/xmlui/handle/123456789/622 | |
dc.description | The healthcare industry has received an explosion in
innovation in the last decade aimed at improving life
expectancy, quality of life, diagnostic and treatment options,
as well as the efficiency and cost effectiveness of the
healthcare system | en_US |
dc.description | The healthcare industry has received an explosion in
innovation in the last decade aimed at improving life
expectancy, quality of life, diagnostic and treatment options,
as well as the efficiency and cost effectiveness of the
healthcare system | en_US |
dc.description.abstract | The increasing expansion of wireless systems and
the extensive popularity and usage of mobile devices such as
mobile phones and wireless tablets represents a great
opportunity to use mobile devices as widespread health data
access tools. Unfortunately, some problems impeding the
general acceptance of mhealth such as privacy protection,
limitation of wireless networks and handheld devices are still
common. Challenges such as unreliable data repositories and
limited connection speeds in resource limited environments are
also evident. The inadequate capabilities of hand-held devices
and wireless systems make these Public Key Cryptography
based frameworks unsuitable for mobile networks. Moreover,
these protocols were designed to preserve customary flow of
health data, which is vulnerable to attack and increase the
user’s risk. This research drew its foundations from literature
and theoretical review and used qualitative approaches. In this
paper, the researchers build on existing concepts of Medical
Information Systems and use of Symmetric Key Infrastructure
to design a framework for secure access to personal electronic
health records. The framework provides identity protection for
a patient from all forms of unathorised data access. The
framework not only reduces the computational operations
between the engaging parties, but also achieves privacy
protection for the user. Validation results from ICT experts
demonstrate that the designed framework is applicable for
secure access to personal medical health records in resource
limited settings | en_US |
dc.description.abstract | The increasing expansion of wireless systems and
the extensive popularity and usage of mobile devices such as
mobile phones and wireless tablets represents a great
opportunity to use mobile devices as widespread health data
access tools. Unfortunately, some problems impeding the
general acceptance of mhealth such as privacy protection,
limitation of wireless networks and handheld devices are still
common. Challenges such as unreliable data repositories and
limited connection speeds in resource limited environments are
also evident. The inadequate capabilities of hand-held devices
and wireless systems make these Public Key Cryptography
based frameworks unsuitable for mobile networks. Moreover,
these protocols were designed to preserve customary flow of
health data, which is vulnerable to attack and increase the
user’s risk. This research drew its foundations from literature
and theoretical review and used qualitative approaches. In this
paper, the researchers build on existing concepts of Medical
Information Systems and use of Symmetric Key Infrastructure
to design a framework for secure access to personal electronic
health records. The framework provides identity protection for
a patient from all forms of unathorised data access. The
framework not only reduces the computational operations
between the engaging parties, but also achieves privacy
protection for the user. Validation results from ICT experts
demonstrate that the designed framework is applicable for
secure access to personal medical health records in resource
limited settings | en_US |
dc.language.iso | en | en_US |
dc.publisher | Mbarara University of Science and Technology | en_US |
dc.subject | —mhealth, security, framework, electronic health records | en_US |
dc.subject | —mhealth, security, framework, electronic health records | en_US |
dc.title | An Access Control Framework for Protecting Personal Electronic Health Records | en_US |
dc.type | Article | en_US |