Abstract
Privacy and integrity of medical records is expected by patients. This privacy and integrity is often mandated by regulations. Traditionally, the security of medical records has been based on physical lock and key. As the storage of patient record information shifts from paper to digital, new security concerns arise. Digital cryptographic methods provide solutions to many of these new concerns. In this article we give an overview of new security concerns, new legislation mandating secure medical records and solutions providing security.
Similar content being viewed by others
References
Lafrance S, Krok S, Moore R, et al: Security vs. Access: A New Health Care Dilemma, in Proceedings of the 1996 Annual HIMSS Conference. Chicago, IL, Heathcare Information and Management Systems Society, 1996, pp 1–9
Wong S: A Cryptologic Based Trust Center for Medical Images. JAMIA 3:410–421, 1996
Smith J: Authentication of Digital Medical Images with Digital Signature Technology. Radiology 194:771–774, 1995
McCurley K: Protecting Privacy and Information Integrity of Computerized Medical Information. http://www.cs.sandia.gov/≈mccurly/health.html
Schneier B: Applied Cryptography (ed 2) New York, NY, John Wiley & Sons, 1996
Stinson D: Cryptography—Theory and Practice. Boca Raton, FL, CRC Press, 1995
Bach E, Bellouin S, Bemstein D: Cryptography-FAQ. http://www.cs.ruu.nl/wais/html/na-dir/cryptography-faq/.html
Menezes A, van Oorschot P, Vanstone S: Handbook of Applied CRYPTOGRAPHY, Boca Raton, FL, CRC Press, 1997, pp 9–10
Rivest R, Shamir A, Adleman L: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2):120–126, 1978
Schneier B: Applied Cryptography (ed 2). New York, NY, Wiley, 1996, pp 258
SSL 3.0 specification. Netscape, Sunnyvale, CA. http://www.jp.netscape.com/eng/ss13/,March 1996
JavaCard API Specification Version 1.0. Sun Microsystems Inc, Mountain View, CA. http://java.sun.com/products/commerce/doc.javacard.ps, October 1996
Schneier B: Applied Cryptography (ed 2), New York, NY, Wiley, 1996, pp 153
Dam K, Lin H: Cryptography’s Role in Securing the Information Society. Washington, DC, National Academy Press, 1996.http://www2.nas.edu/cstbweb/28e2.html (prepublication copy ed.)
Auston I, Humphreys B, Clayton P: Confidentiality of electronic health data: methods for protecting personally identifiable information. Washington, DC, National Library of Medicine, US Department of Health and Human Services. http://www.nlm.nih.gov/pubs/cbm/confiden.html
Schneier B: Applied Cryptography (ed 2). New York, NY, Wiley, 1996, pp 597–618
US Department of State: International Traffic in Arms Regulations (ITAR), 22 CFR 120–130 (Office of Munitions Control, 1989)
Consultation Committee, International Telephone and Telegraph: Recommendation X.509, in The Directory-Authentication Framework. Geneva, Switzerland, International Telecommunications Union, 1989
Pollack A: Counterfeiters of a New Stripe Give Japan One More Worry: Fake Cards Thwart Efforts to End Pinball Scams. New York Times, Thursday June 20, 1996 (col. 2, pg. 1, sec. D)
Schneier B: Applied Cryptography (ed 2) New York, NY, Wiley, 1996, pp 191–193
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Epstein, M.A., Pasieka, M.S., Lord, W.P. et al. Security for the digital information age of medicine: Issues, applications, and implementation. J Digit Imaging 11, 33–44 (1998). https://doi.org/10.1007/BF03168723
Issue Date:
DOI: https://doi.org/10.1007/BF03168723