Skip to main content

e-Health for Rural Areas in Developing Countries: Lessons from the Sebokeng Experience

  • Conference paper
e-Infrastructure and e-Services for Developing Countries (AFRICOMM 2011)

Abstract

We report the experience gained in an e-Health project in the Gauteng province, in South Africa. A Proof-of-Concept of the project has been already installed in 3 clinics in the Sebokeng township. The project is now going to be applied to 300 clinics in the whole province. This extension of the Proof-of-Concept can however give rise to security flaws because of the inclusion of rural areas with unreliable Internet connection. We address this problem and propose a safe solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Health Level Seven organization: Hl7 standards (2009), http://www.hl7.org

  2. The epSOS project: An European eHealth Project (2010), http://www.epsos.eu

  3. The Nationwide Health Information Network (NHIN): An American eHealth Project (2009), http://healthit.hhs.gov/portal/server.pt (last visited on July 4, 2011)

  4. The IHE Initiative: IT Infrastructure Technical Framework (2009), http://www.ihe.net

  5. ACR-NEMA: Digital Imaging and Communications in Medicine (DICOM) (1995)

    Google Scholar 

  6. OASIS Security Services TC: Assertions and protocols for the OASIS security assertion markup language (SAML) v2.02 (2005), http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf .

  7. Mosupi, M.: Gauteng Department of Health (GDoH): E-HR.GP, System Implementation (2008), http://www.ihe-austria.at/fileadmin/user_upload/CAT2009/documents/MmakgosiMosupiIHE_Conference_Presentation_220409.pdf (last visited on July 4, 2011)

  8. Wikipedia, the free encyclopedia: Sebokeng, Gauteng. Wikipedia entry, http://en.wikipedia.org/wiki/Sebokeng,_Gauteng (last visited on July 4, 2011)

  9. Masi, M., Pugliese, R., Tiezzi, F.: Security analysis of standard- driven communication protocols for healthcare scenarios. In: Healthcom, pp. 308–315. IEEE (2011)

    Google Scholar 

  10. Fantechi, A., Gnesi, S., Lapadula, A., Mazzanti, F., Pugliese, R., Tiezzi, F.: A Logical Verification Methodology for Service-Oriented Computing. ACM Transactions on Software Engineering and Methodology (2011) (to appear)

    Google Scholar 

  11. Wikipedia, the free encyclopedia: Intrusion Detection Systems. Wikipedia entry, http://en.wikipedia.org/wiki/Intrusion_detection_system (last visited on July 4, 2011)

  12. Lowe, G.: A Hierarchy of Authentication Specifications. In: CSFW, pp. 31–44. IEEE (1997)

    Google Scholar 

  13. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–207 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  14. The Nationwide Health Information Network (NHIN): Threat models (2009), http://wiki.directproject.org/Threat+Models (last visited on July 4, 2011)

  15. Yarali, A., Ahsant, B., Rahman, S.: Wireless mesh networking: A key solution for emergency & rural applications. In: MESH, pp. 143–149. IEEE (2009)

    Google Scholar 

  16. Armando, A., Carbone, R., Compagna, L., Cuellar, J., Abad, L.: Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps. In: FMSE, pp. 1–10. ACM (2008)

    Google Scholar 

  17. Johnson, J., Langworthy, D., Lamport, L., Vogt, F.: Formal specification of a web services protocol. In: WSFM. ENTCS, vol. 105, pp. 147–158. Elsevier (2004)

    Google Scholar 

  18. Blanchet, B.: CryptoVerif: Computationally Sound Mechanized Prover for Cryptographic Protocols. Dagstuhl seminar “Formal Protocol Verification Applied” (2007)

    Google Scholar 

  19. Bhargavan, K., Corin, R., Fournet, C., Gordon, A.: Secure sessions for web services. In: SWS, pp. 56–66. ACM (2004)

    Google Scholar 

  20. Ma, L., Tsai, J.: Formal verification techniques for computer communication security protocols. Handbook of Software Engineering and Knowledge Engineering 1, 23–46 (2001)

    Google Scholar 

  21. Fidge, C.: A Survey of Verification Techniques for Security Protocols. Technical Report 01-22, Software Verification Research Centre, Univ. of Queensland (2001)

    Google Scholar 

  22. Armellin, G., Bogoni, L.P., Chiasera, A., Toai, T.J., Zanella, G.: Enabling Business Intelligence Functions over a Loosely Coupled Environment. In: Popescu-Zeletin, R., Rai, I.A., Jonas, K., Villafiorita, A. (eds.) AFRICOMM 2010. LNICST, vol. 64, pp. 122–131. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Masi, M., Pugliese, R., Tiezzi, F. (2012). e-Health for Rural Areas in Developing Countries: Lessons from the Sebokeng Experience. In: Popescu-Zeletin, R., Jonas, K., Rai, I.A., Glitho, R., Villafiorita, A. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29093-0_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29093-0_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29092-3

  • Online ISBN: 978-3-642-29093-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics