Skip to main content
Log in

Security for the digital information age of medicine: Issues, applications, and implementation

  • Published:
Journal of Digital Imaging Aims and scope Submit manuscript

Abstract

Privacy and integrity of medical records is expected by patients. This privacy and integrity is often mandated by regulations. Traditionally, the security of medical records has been based on physical lock and key. As the storage of patient record information shifts from paper to digital, new security concerns arise. Digital cryptographic methods provide solutions to many of these new concerns. In this article we give an overview of new security concerns, new legislation mandating secure medical records and solutions providing security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Lafrance S, Krok S, Moore R, et al: Security vs. Access: A New Health Care Dilemma, in Proceedings of the 1996 Annual HIMSS Conference. Chicago, IL, Heathcare Information and Management Systems Society, 1996, pp 1–9

    Google Scholar 

  2. Wong S: A Cryptologic Based Trust Center for Medical Images. JAMIA 3:410–421, 1996

    CAS  PubMed  Google Scholar 

  3. Smith J: Authentication of Digital Medical Images with Digital Signature Technology. Radiology 194:771–774, 1995

    CAS  PubMed  Google Scholar 

  4. McCurley K: Protecting Privacy and Information Integrity of Computerized Medical Information. http://www.cs.sandia.gov/≈mccurly/health.html

  5. Schneier B: Applied Cryptography (ed 2) New York, NY, John Wiley & Sons, 1996

    Google Scholar 

  6. Stinson D: Cryptography—Theory and Practice. Boca Raton, FL, CRC Press, 1995

    Google Scholar 

  7. Bach E, Bellouin S, Bemstein D: Cryptography-FAQ. http://www.cs.ruu.nl/wais/html/na-dir/cryptography-faq/.html

  8. Menezes A, van Oorschot P, Vanstone S: Handbook of Applied CRYPTOGRAPHY, Boca Raton, FL, CRC Press, 1997, pp 9–10

    Google Scholar 

  9. Rivest R, Shamir A, Adleman L: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2):120–126, 1978

    Article  Google Scholar 

  10. Schneier B: Applied Cryptography (ed 2). New York, NY, Wiley, 1996, pp 258

    Google Scholar 

  11. SSL 3.0 specification. Netscape, Sunnyvale, CA. http://www.jp.netscape.com/eng/ss13/,March 1996

  12. JavaCard API Specification Version 1.0. Sun Microsystems Inc, Mountain View, CA. http://java.sun.com/products/commerce/doc.javacard.ps, October 1996

  13. Schneier B: Applied Cryptography (ed 2), New York, NY, Wiley, 1996, pp 153

    Google Scholar 

  14. Dam K, Lin H: Cryptography’s Role in Securing the Information Society. Washington, DC, National Academy Press, 1996.http://www2.nas.edu/cstbweb/28e2.html (prepublication copy ed.)

    Google Scholar 

  15. Auston I, Humphreys B, Clayton P: Confidentiality of electronic health data: methods for protecting personally identifiable information. Washington, DC, National Library of Medicine, US Department of Health and Human Services. http://www.nlm.nih.gov/pubs/cbm/confiden.html

  16. Schneier B: Applied Cryptography (ed 2). New York, NY, Wiley, 1996, pp 597–618

    Google Scholar 

  17. US Department of State: International Traffic in Arms Regulations (ITAR), 22 CFR 120–130 (Office of Munitions Control, 1989)

  18. Consultation Committee, International Telephone and Telegraph: Recommendation X.509, in The Directory-Authentication Framework. Geneva, Switzerland, International Telecommunications Union, 1989

    Google Scholar 

  19. Pollack A: Counterfeiters of a New Stripe Give Japan One More Worry: Fake Cards Thwart Efforts to End Pinball Scams. New York Times, Thursday June 20, 1996 (col. 2, pg. 1, sec. D)

  20. Schneier B: Applied Cryptography (ed 2) New York, NY, Wiley, 1996, pp 191–193

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Epstein, M.A., Pasieka, M.S., Lord, W.P. et al. Security for the digital information age of medicine: Issues, applications, and implementation. J Digit Imaging 11, 33–44 (1998). https://doi.org/10.1007/BF03168723

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF03168723

Key Words

Navigation