A reliable user authentication and key agreement scheme for web-based hospital-Acquired infection surveillance information system

Zhen Yu Wu*, Yi Ju Tseng, Yufang Chung, Yee Chun Chen, Feipei Lai

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

11 Scopus citations

Abstract

With the rapid development of the Internet, both digitization and electronic orientation are required on various applications in the daily life. For hospital-Acquired infection control, a Web-based Hospital-Acquired Infection Surveillance System was implemented. Clinical data from different hospitals and systems were collected and analyzed. The hospital-Acquired infection screening rules in this system utilized this information to detect different patterns of defined hospital-Acquired infection. Moreover, these data were integrated into the user interface of a signal entry point to assist physicians and healthcare providers in making decisions. Based on Service-Oriented Architecture, web-service techniques which were suitable for integrating heterogeneous platforms, protocols, and applications, were used. In summary, this system simplifies the workflow of hospital infection control and improves the healthcare quality. However, it is probable for attackers to intercept the process of data transmission or access to the user interface. To tackle the illegal access and to prevent the information from being stolen during transmission over the insecure Internet, a password-based user authentication scheme is proposed for information integrity.

Original languageEnglish
Pages (from-to)2547-2555
Number of pages9
JournalJournal of Medical Systems
Volume36
Issue number4
DOIs
StatePublished - 08 2012
Externally publishedYes

Keywords

  • Authentication
  • Hospital-Acquired infection
  • Illegal access
  • Infection control
  • Surveillance system

Fingerprint

Dive into the research topics of 'A reliable user authentication and key agreement scheme for web-based hospital-Acquired infection surveillance information system'. Together they form a unique fingerprint.

Cite this