Research Article
An E-Hospital Security Architecture
@INPROCEEDINGS{10.1007/978-3-642-11723-7_43, author={Fang Tian and Carlisle Adams}, title={An E-Hospital Security Architecture}, proceedings={Ad Hoc Networks. First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers}, proceedings_a={ADHOCNETS}, year={2012}, month={7}, keywords={Availability JADE Layered Security Protection Identity -Based Cryptography Elliptic Curve Cryptography Public Cryptography}, doi={10.1007/978-3-642-11723-7_43} }
- Fang Tian
Carlisle Adams
Year: 2012
An E-Hospital Security Architecture
ADHOCNETS
Springer
DOI: 10.1007/978-3-642-11723-7_43
Abstract
In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients’ privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.