Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Challenges

From Openresearch
Jump to: navigation, search
Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Challenges
Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Challenges
Dates Invalid date
"Invalid date" contains an extrinsic dash or other characters that are invalid for a date interpretation.
(iCal) - 2017/07/28
Homepage: http://www.igi-global.com/calls-for-papers-special/international-journal-health-medical-communications/1158
Location
Location: N/A, undefined
Loading map...

Important dates
Submissions: 2017/08/30
Table of Contents


Special Issue On: Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Challenges

Introduction The exponential growth of the internet and networked infrastructure has resulted in electronics creeping into every important sphere like banking, governance, commerce and healthcare etc., giving rise to e- banking, e- governance, e-commerce and e-healthcare. Electronic-healthcare is nowadays taking lead in healthcare related activities and is rapidly changing the dynamics of conventional paper based healthcare and making the distance between a patient and doctor immaterial. However, successful implementation of an e-healthcare system is accompanied by a number of challenges which include privacy and content authentication of Electronic Health Record (EHR) / Electronic Medical Record (EMR). Though existing e-healthcare service providers claim that the patients can only access their electronic records, healthcare professionals and system/database operators may happen to access the patients’ electronic health record information. However the claim has proved to be hoax in presence of current day technology and computation power. The conventional methods for preserving the privacy of healthcare systems entirely trust the system operators. Therefore, the health related information (EHR) is vulnerable to be exploited by even the authorized personnel in an immoral/unethical way. Of late chaotic cryptography and information hiding is being used as potential technological tools for taking care of the mentioned issues. This special issue is an endeavor in the direction to gather state of art work in the area for benefit of the research community working in the area in particular and the common masses in general.

Objective The aim of this special issue is to nurture novel and transformative and approaches that ensure the authentication and security of EHR taking into consideration the challenges of duplication and replication in present multimedia age. This special issue also aims to nurture a research community committed to advancing research and education at the confluence of electronic patient data privacy, security and authentication.

Recommended Topics Topics to be discussed in this special issue include (but are not limited to) the following:

E-health Information Retrieval, Analysis, Visualization and Prediction Watermarking for authentication of EHR Cryptography for security and privacy of EHR Reversible information (EHR) hiding in medical images Tele-homecare and Ubiquitous Healthcare Healthcare Industry Applications Chaos based security algorithms for E-health applications Intrusion and fraud detection in E-health systems E-health Information Modeling and Integration Signal processing for computationally efficient E-health systems Medical Image/Video Processing and Mining Wireless/Mobile Telemedicine Security and privacy issues of wireless sensor networks in healthcare applications Authentication and identification technologies Access control and consent management Data security and privacy for mobile healthcare devices Secure healthcare information exchange Information governance’s privacy and security in healthcare Trust and privacy management Intrusion detection in mobile healthcare systems


Submission Procedure Researchers and practitioners are invited to submit papers for this special theme issue on Emerging Technologies for Security Authentication and of Electronic Health Record (EHR): Opportunities and Challenges on or before August 30, 2017. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/journals/guidelines-for-submission.aspx. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

Guest Editors: Shabir A. Parah (LGE) M.Sc. M. Phil. PhD Department of Electronics and IT University of Kashmir Srinagar, India shabireltr@gmail.com

Irfan Mehmood BS, MS, PhD Department of Computer Engineering Sejong University Seoul, Republic of Korea irfan3797@gmail.com

Muhammad Sajjad BS, MS, PhD Department of Computer Science Islamia College University Peshawar, Pakistan sajjad3797@gmail.com

AcronymTechnologies for Security of EHR 2017 +
End dateJuly 28, 2017 +
Event typeWorkshop +
Has coordinates9° 6' 7", 76° 36' 21"Latitude: 9.1019277777778
Longitude: 76.605963888889
+
Has location cityN/A +
Has location countryCategory:Undefined +
Homepagehttp://www.igi-global.com/calls-for-papers-special/international-journal-health-medical-communications/1158 +
IsAEvent +
Submission deadlineAugust 30, 2017 +
TitleTechnologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Challenges +