Meeting EHR Security Requirements: Authentication as a Security Service.
Basel KattThomas TrojerRuth BreuThomas SchabetsbergerFlorian WozakPublished in: perspeGKtive (2010)
Keyphrases
- security requirements
- security mechanisms
- security analysis
- information security
- smart card
- security properties
- security problems
- security services
- security policies
- access control
- security concerns
- symmetric key
- security model
- mobile commerce
- software architecture
- security patterns
- electronic health records
- authentication protocol
- security protocols
- image encryption
- high security
- covert channel
- secure electronic