Abstract
We report the experience gained in an e-Health project in the Gauteng province, in South Africa. A Proof-of-Concept of the project has been already installed in 3 clinics in the Sebokeng township. The project is now going to be applied to 300 clinics in the whole province. This extension of the Proof-of-Concept can however give rise to security flaws because of the inclusion of rural areas with unreliable Internet connection. We address this problem and propose a safe solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Health Level Seven organization: Hl7 standards (2009), http://www.hl7.org
The epSOS project: An European eHealth Project (2010), http://www.epsos.eu
The Nationwide Health Information Network (NHIN): An American eHealth Project (2009), http://healthit.hhs.gov/portal/server.pt (last visited on July 4, 2011)
The IHE Initiative: IT Infrastructure Technical Framework (2009), http://www.ihe.net
ACR-NEMA: Digital Imaging and Communications in Medicine (DICOM) (1995)
OASIS Security Services TC: Assertions and protocols for the OASIS security assertion markup language (SAML) v2.02 (2005), http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf .
Mosupi, M.: Gauteng Department of Health (GDoH): E-HR.GP, System Implementation (2008), http://www.ihe-austria.at/fileadmin/user_upload/CAT2009/documents/MmakgosiMosupiIHE_Conference_Presentation_220409.pdf (last visited on July 4, 2011)
Wikipedia, the free encyclopedia: Sebokeng, Gauteng. Wikipedia entry, http://en.wikipedia.org/wiki/Sebokeng,_Gauteng (last visited on July 4, 2011)
Masi, M., Pugliese, R., Tiezzi, F.: Security analysis of standard- driven communication protocols for healthcare scenarios. In: Healthcom, pp. 308–315. IEEE (2011)
Fantechi, A., Gnesi, S., Lapadula, A., Mazzanti, F., Pugliese, R., Tiezzi, F.: A Logical Verification Methodology for Service-Oriented Computing. ACM Transactions on Software Engineering and Methodology (2011) (to appear)
Wikipedia, the free encyclopedia: Intrusion Detection Systems. Wikipedia entry, http://en.wikipedia.org/wiki/Intrusion_detection_system (last visited on July 4, 2011)
Lowe, G.: A Hierarchy of Authentication Specifications. In: CSFW, pp. 31–44. IEEE (1997)
Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–207 (1983)
The Nationwide Health Information Network (NHIN): Threat models (2009), http://wiki.directproject.org/Threat+Models (last visited on July 4, 2011)
Yarali, A., Ahsant, B., Rahman, S.: Wireless mesh networking: A key solution for emergency & rural applications. In: MESH, pp. 143–149. IEEE (2009)
Armando, A., Carbone, R., Compagna, L., Cuellar, J., Abad, L.: Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps. In: FMSE, pp. 1–10. ACM (2008)
Johnson, J., Langworthy, D., Lamport, L., Vogt, F.: Formal specification of a web services protocol. In: WSFM. ENTCS, vol. 105, pp. 147–158. Elsevier (2004)
Blanchet, B.: CryptoVerif: Computationally Sound Mechanized Prover for Cryptographic Protocols. Dagstuhl seminar “Formal Protocol Verification Applied” (2007)
Bhargavan, K., Corin, R., Fournet, C., Gordon, A.: Secure sessions for web services. In: SWS, pp. 56–66. ACM (2004)
Ma, L., Tsai, J.: Formal verification techniques for computer communication security protocols. Handbook of Software Engineering and Knowledge Engineering 1, 23–46 (2001)
Fidge, C.: A Survey of Verification Techniques for Security Protocols. Technical Report 01-22, Software Verification Research Centre, Univ. of Queensland (2001)
Armellin, G., Bogoni, L.P., Chiasera, A., Toai, T.J., Zanella, G.: Enabling Business Intelligence Functions over a Loosely Coupled Environment. In: Popescu-Zeletin, R., Rai, I.A., Jonas, K., Villafiorita, A. (eds.) AFRICOMM 2010. LNICST, vol. 64, pp. 122–131. Springer, Heidelberg (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Masi, M., Pugliese, R., Tiezzi, F. (2012). e-Health for Rural Areas in Developing Countries: Lessons from the Sebokeng Experience. In: Popescu-Zeletin, R., Jonas, K., Rai, I.A., Glitho, R., Villafiorita, A. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29093-0_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-29093-0_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29092-3
Online ISBN: 978-3-642-29093-0
eBook Packages: Computer ScienceComputer Science (R0)