images, all of which need to be protected. For
example, a study may contain hundreds of DICOM
images, and following the DICOM standards in
these cases is impracticable in real-world clinical
operations. The manifest signature can be used not
only for the exchange of EHR, but also for EHR
long-term storage in hospitals.
Fast and reliable proof of authenticity and
integrity is needed for security considerations when
an EHR became portable. It is common that patients
collect their own health records from different
hospitals and manage the process by themselves.
The implementation of a centralized health record
containing personal health records is very difficult
when taking into considerations of the physicians’
intellectual property rights and patient privacy.
5 CONCLUSIONS
The computational time of this prototype is much
lower than that of the one by one digital signature
method. Following the existing medical information
digital signature rules, the practice is not feasible.
Using the proposed method, the computational time
is reduced. In addition, this method can be used not
only for the exchange of EHRs, but also for their
long-term storage.
ACKNOWLEDGEMENTS
This work was supported by the National Science
Council of Taiwan under Grant NSC 95-2221-E010-
003.
REFERENCES
Bates, DW, Ebell M, Gotlieb, E, Zapp, J, & Mullins, HC
2003, ‘A Proposal for Electronic Medical Records in
U.S. Primary Care’, Journal of the American Medical
Informatics Association, vol. 10, no. 1, pp. 1-10.
France, FHR, Bangels, M & De Clercq, E 2007, ‘Purposes
of health identification cards and role of a secure
access platform (Be-Health) in Belgium’,
International Journal of Medical Informatics, vol. 76,
no. 2-3, pp. 84-88.
Lekkas, D & Gritzalis, D 2007, ‘Long-term verifiability of
the electronic healthcare records’ authenticity’,
International Journal of Medical Informatics, vol. 76,
no. 5-6, pp. 442-448.
Lekkas, D, Gritzalis, S & Katsikas, S 2002, ‘Quality
assured trusted third parties for deploying secure
internet-based healthcare applications’, International
Journal of Medical Informatics, vol. 65, no. 2, pp. 79-
96.
Makoul, G, Curry, RH & Tang, PC 2001, ‘The Use of
Electronic Medical Records: Communication Patterns
in Outpatient Encounters’, Journal of the American
Medical Informatics Association, vol. 8, no. 6, pp.
610-615.
Pharow, P & Blobel, B 2005, ‘Electronic signatures for
long-lasting storage purposes in electronic archives’,
International Journal of Medical Informatics, vol. 74,
no. 2-4, pp. 279-287.
Schurig, A, Heuser, H & Wedekind, R 2001, ‘Introduction
of the health professional card into the
SAXTELEMED-Project’, International Congress
Series, vol. 1230, pp. 867-871.
Tang, PC, Ash, JS, Bates, DW, Overhage, JMS & Sands,
DZ 2006, ‘Personal Health Records: Definitions,
Benefits, and Strategies for Overcoming Barriers to
Adoption’, Journal of the American Medical
Informatics Association, vol. 13, no. 2, pp. 121-126.
Wang, M, Lau, C, Matsen, FAIII & Kim, Y 2004,
‘Personal health information management system and
its application in referral management’, IEEE
Transactions on Information Technology in
Biomedicine, vol. 8, no. 3, pp. 287-297.
Yang, CM, Lin, HC, Chang P & Jian, WS 2006, ‘Taiwan’s
perspective on electronic medical records’ security and
privacy protection: Lessons learned from HIPAA’,
Computer Methods and Programs in Biomedicine, vol.
82, no. 3, pp. 277-282.
Zhou, XQ, Huang, HK & Lou, SL 2001. ‘Authenticity and
integrity of digital mammography images’, IEEE
Transactions on Medical Imaging, vol. 20, no. 8, pp.
784-791.
AUTHENTICITY AND INTEGRITY OF PORTABLE ELECTRONIC HEALTH RECORDS
71