posted by user: khansju || 5211 views || tracked by 3 users: [display]

Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Challenges


When N/A
Where N/A
Submission Deadline Aug 30, 2017
Categories    information security   healthcare systems   electronic health records   medical images

Call For Papers

Special Issue On: Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Challenges

The exponential growth of the internet and networked infrastructure has resulted in electronics creeping into every important sphere like banking, governance, commerce and healthcare etc., giving rise to e- banking, e- governance, e-commerce and e-healthcare. Electronic-healthcare is nowadays taking lead in healthcare related activities and is rapidly changing the dynamics of conventional paper based healthcare and making the distance between a patient and doctor immaterial. However, successful implementation of an e-healthcare system is accompanied by a number of challenges which include privacy and content authentication of Electronic Health Record (EHR) / Electronic Medical Record (EMR). Though existing e-healthcare service providers claim that the patients can only access their electronic records, healthcare professionals and system/database operators may happen to access the patients’ electronic health record information. However the claim has proved to be hoax in presence of current day technology and computation power. The conventional methods for preserving the privacy of healthcare systems entirely trust the system operators. Therefore, the health related information (EHR) is vulnerable to be exploited by even the authorized personnel in an immoral/unethical way. Of late chaotic cryptography and information hiding is being used as potential technological tools for taking care of the mentioned issues. This special issue is an endeavor in the direction to gather state of art work in the area for benefit of the research community working in the area in particular and the common masses in general.

The aim of this special issue is to nurture novel and transformative and approaches that ensure the authentication and security of EHR taking into consideration the challenges of duplication and replication in present multimedia age. This special issue also aims to nurture a research community committed to advancing research and education at the confluence of electronic patient data privacy, security and authentication.

Recommended Topics
Topics to be discussed in this special issue include (but are not limited to) the following:

E-health Information Retrieval, Analysis, Visualization and Prediction
Watermarking for authentication of EHR
Cryptography for security and privacy of EHR
Reversible information (EHR) hiding in medical images
Tele-homecare and Ubiquitous Healthcare
Healthcare Industry Applications
Chaos based security algorithms for E-health applications
Intrusion and fraud detection in E-health systems
E-health Information Modeling and Integration
Signal processing for computationally efficient E-health systems
Medical Image/Video Processing and Mining
Wireless/Mobile Telemedicine
Security and privacy issues of wireless sensor networks in healthcare applications
Authentication and identification technologies
Access control and consent management
Data security and privacy for mobile healthcare devices
Secure healthcare information exchange
Information governance’s privacy and security in healthcare
Trust and privacy management
Intrusion detection in mobile healthcare systems

Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Emerging Technologies for Security Authentication and of Electronic Health Record (EHR): Opportunities and Challenges on or before August 30, 2017. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

Guest Editors:
Shabir A. Parah (LGE)
M.Sc. M. Phil. PhD
Department of Electronics and IT
University of Kashmir
Srinagar, India

Irfan Mehmood
Department of Computer Engineering
Sejong University
Seoul, Republic of Korea

Muhammad Sajjad
Department of Computer Science
Islamia College University
Peshawar, Pakistan

Related Resources

SITAIBA 2021   SITAIBA 2021 : 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
DMSE 2021   2nd International Conference on Data Mining and Software Engineering
EASAT 2021   Special issue on Emerging Application of Sentiment Analysis Technologies
IJCIS 2021   International Journal on Cryptography and Information Security
WI-IAT 2021   The 20th IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT '21) 14-17 December 2021, Melbourne, Australia
CTCM 2021   7th International Conference of Control Theory and Computer Modelling
IEEE TETC-ETTRML 2021   Special Section on “To Be Safe and Dependable in the Era of Artificial Intelligence: Emerging Techniques for Trusted and Reliable Machine Learning”
IJASA 2021   The International Journal of Ambient Systems and applications