Abstract
Ubiquitous access to patient medical records is an important aspect of caring for patient safety. Unavailability of sufficient medical information at the patient point-of-care could possibly lead to a fatality. In this paper we propose employing emergent technologies such as Java SIM Cards (JSC), Smart Phones (SP), Next Generation Networks (NGN), Near Field Communications (NFC), Public Key Infrastructure (PKI), and Biometric Identification to develop a secure framework and related protocols for ubiquitous access to Electronic Health Records (EHRs). A partial EHR contained within a JSC can be used at the patient point-of-care in order to help quick diagnosis of a patient’s problems. The full EHR can be accessed from an Electronic Healthcare Records Centre (EHRC).
Chapter PDF
Similar content being viewed by others
Keywords
References
Institute-of-Medicine. To err is human: Building a safer health system 2000, www.nap.edu/books/0309068371/html (cited September 23, 2008)
Abraham, C., Watson, R.T., Boudreau, M.-C.: Ubiquitous access: on the front lines of patient care and safety. Communications of the ACM 51(6), 95–99 (2008)
Issa, O., Gregoire, J.C., Belala, Y., James, W.: 3G Embedded Communication System for Medical Applications. In: 2nd Annual IEEE Systems Conference (2008)
Chenhui, Z., Huilong, D., Xudong, L.: An Integration Approach of Healthcare Information System. In: International Conference on BioMedical Engineering and Informatics (2008)
Bishop, B., Maloney, D., Wilson, P., Nader, N., Sembritzki, J., Meazzini, G., Morency, D.: US cards hold medical records. Card Technology Today 12(6), 14–15 (2000)
Chan, A.T.S., Cao, J., Chan, H., Young, G.: A web-enabled framework for smart card applications in health services. Communications of the ACM 44(9), 76–82 (2001)
Chang, Y.F., Chen, C.S., Zhou, H.: Smart phone for mobile commerce. Computer Standards & Interfaces 31(4), 740–747 (2009)
Kim, D.-K., Mehta, P., Gokhale, P.: Describing access control models as design patterns using roles. Paper Presented at the Proceedings of the, Conference on Pattern Languages of Programs (2006) (retrieved)
Alhaqbani, B., Fidge, C.: Access Control Requirements for Processing Electronic Health Records. In: ter Hofstede, A.H.M., Benatallah, B., Paik, H.-Y. (eds.) BPM Workshops 2007. LNCS, vol. 4928, pp. 371–382. Springer, Heidelberg (2008)
Kambourakis, G., Maglogiannis, I., Rouskas, A.: PKI-based secure mobile access to electronic health services and data. Technology & Health Care 13(6), 511–526 (2005)
Articsoft. Introduction to Public Key Infrastructure (2009), http://www.governmentsecurity.org/forum/index.php?showtopic=1630 (cited May 10, 2009)
The Biometric Consortium. An Introduction to Biometric (2009), http://www.biometrics.org/html/introduction.html (cited May 10, 2009)
ITU-T Next Generation Network. Definition of Next Generation Network (2009), http://www.itu.int/ITU-T/studygroups/com13/ngn2004/working_definition.html (cited May 10, 2009)
Morak, J., Hayn, D., Kastner, P., Drobics, M., Schreier, G.: Near Field Communication Technology as the Key for Data Acquisition in Clinical Research. In: First International Workshop on Near Field Communication, NFC ’09 (2009)
Pak, T.: JAVA SIM card (2009), http://www.tele-pak.com/plastic-cards/javacards.html (cited December 23, 2009)
Peersman, C., Cvetkovic, S., Griffiths, P., Spear, H.: The Global System for Mobile Communications Short Message Service. IEEE Personal Communications 7(3), 15–23 (2000)
Hu, J.: Mobile fingerprint template protection: Progress and open issues. In: 3rd IEEE Conference on Industrial Electronics and Applications, ICIEA 2008 (2008)
Chin, L.-P., Chen, J.-Y.: SIM card based e-cash applications in the mobile communication system using OTA and STK technology. In: 2006 IET International Conference on Wireless, Mobile and Multimedia Networks (2006)
Haverinen, H., Asokan, N., Maattanen, T.: Authentication and key generation for mobile IP using GSM authentication and roaming. In: IEEE International Conference on Communications, ICC 2001 (2001)
Chen, Z.: Technology for Smart Cards: Architecture and Programmer’s Guide 2000. Pearson, London (2000)
ITU-T X.210, ITU-T Recommendation X.210. Open Systems Interconnection - Basic Reference Model: Conventions for the Definition of OSI Services (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP
About this paper
Cite this paper
Hassanzadeh, R., Sahama, T., Fidge, C. (2010). A Secure Framework and Related Protocols for Ubiquitous Access to Electronic Health Records Using Java SIM Cards. In: Takeda, H. (eds) E-Health. E-Health 2010. IFIP Advances in Information and Communication Technology, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15515-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-15515-4_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15514-7
Online ISBN: 978-3-642-15515-4
eBook Packages: Computer ScienceComputer Science (R0)