Browse > Article

Electronic Medical Record Modification Prevention Protocol  

Joo, Han-Kyu (한림대학교)
Publication Information
Journal of Digital Contents Society / v.11, no.2, 2010 , pp. 135-144 More about this Journal
Abstract
Medical records are very important records and should not be modified after creation. The current medical records are liable to improper modification. With the development of information technology, electronic medical records (EMR) are used widely. For the EMR, cryptographic primitives may be used to develop techniques to prevent medical record modofication. In this research, a technique to prevent improper medical record prevention is proposed. It uses crytographic primitives such as linked hash, digital signature, and electronic notarization. A prototype system is also developed for performance analysis. The proposed method makes the medical record modification impossible with a small amount of additional cost.
Keywords
전자의무기록;신뢰성;해쉬;전자서명;전자공증;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 R. L. Rivest et al., "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, Vol 21, pp. 120-126, 1978.   DOI   ScienceOn
2 "Digital Signature Standard", FIPS 186, NIST, 1994.
3 A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
4 전자서명법, 법률 제9208호, 2008.
5 의료법 시행규칙, 보건복지부령 제 1호, 2010.
6 2005년도 의료 피해구제 업무분석 결과, 한국소비자원, 2006.
7 전영주, "의료법상 의료정보 보호방안 - 의무기록 보호를 중심으로", 법학연구, 28, pp. 465-483, 2007.
8 의료법, 법률 제 9923호, 2010.
9 김경호, "전자의무기록(EMR)을 활용한 원무관리 개선" 법과 정책연구, 6(1), pp. 95-115, 2006.
10 전자의무기록에 대한 공인전자서명 적용 지침, 정책- 의료정보-2004-57, 한국보건산업진흥원, 2004.
11 신용원, 박정선, "전자의무기록에 대한 공인전자서명 적용 지침 개발", 한국콘텐츠학회논문지, 5(6), pp. 120 - 128, 2005.   과학기술학회마을
12 하규섭, EMR 개발의 실제-분당 서울대병원 EMR 구축과 활용, 분당서울대병원 의료정보과, 2004.
13 전자의무기록 시스템 - bitnix EMR, http://www.bit.kr/image/02_business/emr/emr.pdf.
14 전자의무기록 시스템 소개 (FK-EMR), 한국 후지쯔 주식회사, 2007.
15 W. Stallings, Cryptography and Network Security - Principles and Practices, 4th Edition, Pearson Education, 2006.
16 R. L. Rivest, "The MD5 message-digest algorithm", RFC 1321, 1992.
17 "Secure Hash Standard", FIPS 180-1, NIST, 1995.