Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 14. Privacy Enhancing Technologi... > FUTURE RESEARCH DIRECTIONS

FUTURE RESEARCH DIRECTIONS

One aspect that was treated rudimentary in this chapter is the vulnerability of the user's client. This issue cannot solely be covered by technical safeguards which are enforced by the EHR system, since it is very hard to establish uniform administrative measures, e.g. policies, for EHR users. For instance, if the operating system at the user's client is prone to security exploits due to missing security patches, malware could be installed unnoticeably on the client. This malware could steal health data independent of the security level of the EHR system. One approach to counter the client vulnerability is trusted computing (TCG, 2009), which helps to reduce the number of attacks against user's clients. This is mainly due to the fact that software as well as hardware components are authenticated to the client by means of cryptographic operations. A very interesting aspect in this context is the use of direct anonymous attestation (Brickell et al., 2004) which enables the EHR system to enforce that user's client complies with software specifications defined by the EHR system. Furthermore, this approach enables the client to anonymously conduct the aforementioned protocol. This means that the anonymity discussed in this chapter will not be compromised at all.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint