Issue No.06 - Nov.-Dec. (2013 vol.11)
pp: 34-41
Gines Dolera Tormo , NEC Laboratories Europe
Felix Gomez Marmol , NEC Laboratories Europe
Joao Girao , NEC Laboratories Europe
Gregorio Martinez Perez , University of Murcia
Healthcare systems are moving to decentralized scenarios, forming a mesh of mobile services and care providers. A rapidly growing number of users aren't shy about using new services on their home computers, mobile phones, and laptops. Identity management solutions, deployed for ease of use, control the data that users provide to individual healthcare services. These solutions raise trust and privacy concerns about who owns users' data, how to control its spread, and how to build trustworthy associations between healthcare providers. Reputation systems can enhance eHealth systems by bridging the gap between strong contractual agreements and first-time domain exchanges.
Privacy, Medical services, Identity management, Medical information systems, Encryption, Electronic medical records,privacy homomorphism, identity management, eHealth services, trust and reputation management, privacy-aware information exchange
Gines Dolera Tormo, Felix Gomez Marmol, Joao Girao, Gregorio Martinez Perez, "Identity Management--In Privacy We Trust: Bridging the Trust Gap in eHealth Environments", IEEE Security & Privacy, vol.11, no. 6, pp. 34-41, Nov.-Dec. 2013, doi:10.1109/MSP.2013.80
1. J.H. Abawajy, Network and Traffic Engineering in Emerging Distributed Computing Applications, IGI Global, 2012, pp. 21-42.
2. A. Josang, R. Ismail, and C. Boyd, “A Survey of Trust and Reputation Systems for Online Service Provision,” Decision Support Systems, vol. 43, no. 2, 2007, pp. 618-644.
3. P. Resnick and R. Zeckhauser, “Trust among Strangers in Internet Transactions: Empirical Analysis of Ebay's Reputation System,” Economics of the Internet and E-commerce, vol. 11, 2002, p. 127.
4. F. Gómez Mármol, J. Girao, and G. Martínez Pérez, “TRIMS, a Privacy-Aware Trust and Reputation Model for Identity Management Systems,” Elsevier Computer Networks J., vol. 54, no. 16, 2010, pp. 2899-2912.
5. F. Gómez Mármol and G. Martínez Pérez, “Towards Pre-standardization of Trust and Reputation Models for Distributed and Heterogeneous Systems,” Computer Standards & Interfaces, Special Issue on Information and Communications Security, Privacy, and Trust: Standards and Regulations, vol. 32, no. 4, 2010, pp. 185-196.
6. T. El Gamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Trans. Information Theory, vol. 31, no. 4, 1985, pp. 469-472.
7. P.-C. Cheng et al., “Fuzzy Multi-level Security: An Experiment on Quantified Risk-Adaptive Access Control,” Proc. IEEE Symp. Security and Privacy, IEEE CS, 2007, pp. 222-230.