
e-Health Security Management
Communications Security, Data Processing Security and Patient Privacy
- English
- PDF
- Available on iOS & Android
e-Health Security Management
Communications Security, Data Processing Security and Patient Privacy
About this book
Digital evolution, whether through Internet advances or the development of connected objects, has triggered a veritable societal revolution. Thanks to technological advances, e-health services enable healthcare professionals to monitor patients in real time. However, new challenges have also arisen in the field of e-health, concerning the security of medical data, as well as the protection of patient privacy.
After presenting e-health architectures and explaining the proliferation of cyber attacks, e-Health Security Management focuses on proposing solutions designed to meet these security imperatives and respect patient privacy, such as the use of blockchain, "biometrics", new encryption methods or artificial intelligence. Implementing these solutions is crucial to guarantee the acceptance and effectiveness of e-health services.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Title Page
- Copyright Page
- Contents
- Chapter 1. Overview of e-Health Architectures
- Chapter 2. Vulnerabilities in e-Health and Countermeasures
- Chapter 3. Security Policies for e-Health Systems
- Chapter 4. Adaptive, Dynamic, Decentralized Authorizations for e-Health
- Chapter 5. Applying Blockchain to e-Health
- Chapter 6. Using Biometrics to Secure Intra-BAN Communications
- Chapter 7. Using Biometrics for Authentication in e-Health Systems
- Chapter 8. Security of Medical Data Processing
- Chapter 9. Artificial Intelligence for Security of e-Health Systems
- List of Authors
- Index
- EULA