Digital signatures in electronic health records: a scoping review

Noraziani K, Nurul’Ain A, Azhim MZ, Eslami SR, Drak B, Sharifa Ezat W, Siti Nurul Akma A. An overview of electronic medical record implementation in healthcare system Lesson to learn. World Appl Sci J. 2013; 25(2):323–32. https://doi.org/10.5829/idosi.wasj.2013.25.02.2537.

Lorenzetti J, Trindade LD, Pires DE, Ramos FR. Technology, technological innovation and health: a necessary reflection. Texto & Contexto-Enfermagem. 2012;21:432–9. https://doi.org/10.1590/S0104-07072012000200023.

Article  Google Scholar 

Kazienko JF. Assinatura digital de documentos eletrônicos através da impressao digital. 2003. Available from: https://repositorio.ufsc.br/handle/123456789/86583. Accesed 06 Dec 2023.

Rezaeibagha F, Win KT, Susilo W. A systematic literature review on security and privacy of electronic health record systems: technical perspectives. Health Inform Manag J. 2015;44(3):23–38. https://doi.org/10.1177/183335831504400304.

Article  Google Scholar 

Amin MM, Salleh M, Ibrahim S, Katmin MR, Shamsuddin MZ. Information hiding using steganography. In 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings. 2003  (pp. 21–25). IEEE. https://doi.org/10.1109/NCTT.2003.1188294.

Pope J. Ransomware: Minimizing the Risks. Innov Clin Neurosci. 2016;13(11–12):37–40. Published 2016 Dec 1. Available from: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5300711/. Accessed 06 Dec 2023.

Braun J, Buchmann J, Demirel D, Geihs M, Fujiwara M, Moriai S, Sasaki M, Waseda A. Lincos: A storage system providing long-term integrity, authenticity, and confidentiality. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security 2017 (pp. 461–468). https://doi.org/10.1145/3052973.3053043.

Lekkas D, Gritzalis D. Long-term verifiability of the electronic healthcare records’ authenticity. Int J Med Inform. 2007;76(5–6):442–8. https://doi.org/10.1016/j.ijmedinf.2006.09.010.

Article  Google Scholar 

Haleem A, Javaid M, Singh RP, Suman R, Rab S. Blockchain technology applications in healthcare: An overview. Intl J Intell Netw. 2021;1(2):130–9. https://doi.org/10.1016/j.ijin.2021.09.005.

Article  Google Scholar 

Hasselgren A, Kralevska K, Gligoroski D, Pedersen SA, Faxvaag A. Blockchain in healthcare and health sciences—A scoping review. Int J Med Informatics. 2020;1(134): 104040. https://doi.org/10.1016/j.ijmedinf.2019.104040.

Article  Google Scholar 

Schwartze J, Haarbrandt B, Fortmeier D, Haux R, Seidel C. Authentication systems for securing clinical documentation workflows A systematic literature review. Methods Inf Med. 2014;53(1):3–13. https://doi.org/10.3414/ME12-01-0078.

Article  Google Scholar 

Tricco AC, Lillie E, Zarin W, et al. PRISMA Extension for Scoping Reviews (PRISMA-ScR): Checklist and Explanation. Ann Intern Med. 2018;169(7):467–73. https://doi.org/10.7326/M18-0850.

Article  Google Scholar 

Aromataris E, Munn Z. JBI Manual for Evidence Synthesis. 2020 ed: JBI; 2020.

Peters M, Godfrey C, McInerney P. Chapter 11: scoping reviews (2020 version) In: Aromataris E, Munn Z (Editors). JBI Manual for Evidence Synthesis, JBI. 2020.

Moher D, Shamseer L, Clarke M, Ghersi D, Liberati A, Petticrew M, et al. Preferred reporting items for systematic review and meta-analysis protocols (PRISMA-P) 2015 statement. Syst Rev. 2015;4:1–9.

Article  Google Scholar 

Oliveira JMD, Felisberto M, Mohr EB, Celuppi IC, Zanotto WL, Santos RA, et al. Digital signatures in electronic health records: a scoping review. June 12, 2022 ed. Open Science Framework, 2022.

Godard-Sebillotte C, Teper MH, Vedel I. Quebec doctors’ pay rise should be evidence based and transparent. BMJ. 2018;362.

Ouzzani M, Hammady H, Fedorowicz Z, Elmagarmid A. Rayyan—a web and mobile app for systematic reviews. Syst Rev. 2016;5:1. https://doi.org/10.1186/s13643-016-0384-4.

Article  Google Scholar 

Gomersall JS, Jadotte YT, Xue Y, Lockwood S, Riddle D, Preda A. Conducting systematic reviews of economic evaluations. Int J Evid Based Healthc. 2015;13(3):170–8. https://doi.org/10.1097/XEB.0000000000000063.

Article  Google Scholar 

Pawson R. Evidence-based policy: The promise of realist synthesis’. Evaluation. 2002;8(3):340–58. https://doi.org/10.1177/135638902401462448.

Article  Google Scholar 

Arksey H, O’Malley L. Scoping studies: towards a methodological framework. Int J Soc Res Methodol. 2005;8(1):19–32. https://doi.org/10.1080/1364557032000119616.

Article  Google Scholar 

Berbecaru D, Lioy A, Marian M, Marano D. Secure Digital Administration in Medical Environment. arXiv preprint arXiv:1910.09027. 2019 Oct 17. https://doi.org/10.48550/arXiv.1910.09027.

Chen CL, Yang TT, Chiang ML, Shih TF. A privacy authentication scheme based on cloud for medical environment. J Med Syst. 2014;38:1–6. https://doi.org/10.1007/s10916-014-0143-9.

Article  Google Scholar 

Chen X, Xu S, He Y, Cui Y, He J, Gao S. LFS-AS: lightweight forward secure aggregate signature for e-health scenarios. In ICC 2022-IEEE International Conference on Communications 2022 May 16 (pp. 1239–1244). IEEE. https://doi.org/10.1109/ICC45855.2022.9838582.

Lee TF, Kung TS, Chang IP. Efficient Signature Scheme Using Extended Chaotic Maps for Medical Imaging Records. In Proceedings of the 4th International Conference on Medical and Health Informatics 2020 14 (pp. 118–121). https://doi.org/10.1145/3418094.3418144.

Lien CY, Yang TL, Hsiao CH, Kao T. Realizing digital signatures for medical imaging and reporting in a PACS environment. J Med Syst. 2013;37:1–1. https://doi.org/10.1007/s10916-012-9924-1.

Article  Google Scholar 

Mo R, Ma J, Liu X, Li Q. FABSS: attribute-based sanitizable signature for flexible access structure. In Information and Communications Security: 19th International Conference, ICICS 2017, Beijing, China, December 6–8, 2017, Proceedings 19 2018 (pp. 39–50). Springer International Publishing. https://doi.org/10.1007/978-3-319-89500-0_3.

Mukti GW, Setiawan H. Designing and building secure electronic medical record application by applying AES-256 and RSA digital signature. In IOP Conference Series: Materials Science and Engineering 2020 (Vol. 852, No. 1, p. 012148). IOP Publishing. https://doi.org/10.1088/1757-899X/852/1/012148.

Sadikin MA, Sunaringtyas SU. Implementing digital signature for the secure electronic prescription using QR-code based on android smartphone. In 2016 International Seminar on Application for Technology of Information and Communication (ISemantic) 2016 (pp. 306–311). IEEE. https://doi.org/10.1109/ISEMANTIC.2016.7873856.

Page MJ, McKenzie JE, Bossuyt PM, Boutron I, Hoffmann TC, Mulrow CD, The PRISMA, et al. statement: an updated guideline for reporting systematic reviews. BMJ. 2020;2021:372.

Google Scholar 

Amirthalingam G, Thangavel H. Multi-biometric authentication using deep learning classifier for securing of healthcare data. Intl J Adv Trends Comput Sci Eng. 2019;8(4):1340–7.

Article  Google Scholar 

Han Y, Zhang Y, Vermund SH. Blockchain technology for electronic health records. Int J Environ Res Public Health. 2022;19(23):15577.

Article  Google Scholar 

Koczkodaj WW, Mazurek M, Strzałka D, Wolny-Dominiak A, Woodbury-Smith M. Electronic health record breaches as social indicators. Soc Indic Res. 2019;141:861–71.

Article  Google Scholar 

Raghav N, Bhola A. Blockchain based privacy preservation in healthcare: a recent trends and challenges. Psychol Educ J. 2021;58:5315–24.

Article  Google Scholar 

Wikina SB. What caused the breach? An examination of use of information technology and health data breaches. Perspectives in health information management. 2014;11(Fall).

He D, Chen J, Zhang R. A more secure authentication scheme for telecare medicine information systems. J Med Syst. 2012;36:1989–95.

Article  Google Scholar 

Wei J, Hu X, Liu W. An improved authentication scheme for telecare medicine information systems. J Med Syst. 2012;36(6):3597–604.

Article  Google Scholar 

Comments (0)

No login
gif