Research of Secure Sharing of Electronic Medical Records in Internet

Article Preview

Abstract:

Regional sharing in electronic medical records (EMR) system are the main problems that the system must face in the development. This paper comprehensive analyzes the existing secure sharing program of EMR, and based on it this paper proposes the program that uses the Trusted Computing technology to ensure the secure sharing of EMR. For ordinary computer can not build trusted computing platform, the embedded trusted system based on the USB interface is used to build trusted computing platform, and based on it this paper proposes the EMR secure sharing scheme based on the embedded trusted system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3390-3397

Citation:

Online since:

May 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Robert H.Dolin,MD,Liora Alschuler,Sandy Boyer,BSP,Calvin Beebe,Fred M. Behlen,PHD,Paul V.Biron,Amnon Shabo(SHVO),PHD. HL7 Clinical Document Architecture,Release2.The American Medical Informatics Association (2006).

DOI: 10.1197/jamia.m1888

Google Scholar

[2] Hripesak G.IAIMS architecture.J Am Med Inform Assoc.Mar 1997-Apr 1997;4(2 Suppl):S20-30.

Google Scholar

[3] Chen T.S.and GoughT.G. The design and development of a fully integrated hospital information system.Greenes R.A.and others,eds.Mediofo 8.1995;569-573.Anderson D. Where did HISS go?-a view from Burton upon Trent.Br J Healthcare Comput Info Manage.2000a;17(10):22-24.

Google Scholar

[4] Kuhn K.A, Lenz R. Building a hospital information system: design considerations base on results from a Europe-wide vendor selection process.Proceedings/AMIA Annual Symposium (1999),pp.834-838.

Google Scholar

[5] Trusted Computing Group. Trusted Platform Module Main Specification Version 1.2. http://www.trustedcomputinggroup.org (2007).

Google Scholar

[6] Garfinkel T, Rosenblum M. A Virtual Machine Introspection-Based Architecture for Intrusion Detection[C]. Proc. of the 10th Annual Network and Distributed Systems Security Symp.(2003),pp.191-206.

Google Scholar