Skip to main content
Top
Published in: Journal of Digital Imaging 2/2010

01-04-2010

Applying a Presentation Content Manifest for Signing Clinical Documents

Authors: Chung-Yueh Lien, Chia-Hung Hsiao, Lu-Chou Huang, Tsair Kao

Published in: Journal of Imaging Informatics in Medicine | Issue 2/2010

Login to get access

Abstract

In this paper, we demonstrate how to digitally sign a content manifest of a presentable clinical document that contains multiple clinical data with presentations. Only one signature is needed for an entire clinical document with multiple data resources, which can reduce the computation time during signing and verifying processes. In the radiology field, a report may contain text descriptions, images, and annotations that are stored separately in different data resources. The manifest signature would be a proper means for integrity checking for all the clinical data within the manifest. The manifest signature can be extended with a trusted third party to add a digital time signature for long-term verifiability. The performance of the manifest signing compared with that of a traditional digital signing was evaluated. The new manifest signature can be used for signing different types of presentable clinical documents, such HL7 CDA documents and DICOM image reports.
Literature
2.
go back to reference Lekkas D, Gritzalis D: Long-term verifiability of the electronic healthcare records’ authenticity. Int J Med Inform 76:442–448, 2007CrossRefPubMed Lekkas D, Gritzalis D: Long-term verifiability of the electronic healthcare records’ authenticity. Int J Med Inform 76:442–448, 2007CrossRefPubMed
3.
go back to reference van der Haak M, Wolff AC, Brandner R, Drings P, Wannenmacher M, Wetter T: Data security and protection in cross-institutional electronic patient records. Int J Med Inform 70:117–130, 2003CrossRefPubMed van der Haak M, Wolff AC, Brandner R, Drings P, Wannenmacher M, Wetter T: Data security and protection in cross-institutional electronic patient records. Int J Med Inform 70:117–130, 2003CrossRefPubMed
4.
go back to reference Schütze B, Kroll M, Geisbe T, Filler TJ: Patient data security in the DICOM standard. Eur J Radiol 51:286–289, 2004CrossRefPubMed Schütze B, Kroll M, Geisbe T, Filler TJ: Patient data security in the DICOM standard. Eur J Radiol 51:286–289, 2004CrossRefPubMed
9.
go back to reference Huang Z, Lu X, Duan H, Li H: Enhanced CDA with electronic signature. The 1st International Conference on Bioinformatics and Biomedical Engineering 1161–1164, 2007 Huang Z, Lu X, Duan H, Li H: Enhanced CDA with electronic signature. The 1st International Conference on Bioinformatics and Biomedical Engineering 1161–1164, 2007
10.
go back to reference Hollerbach A, Brandner R, Bess A, Schmücker P, Bergh B: Electronically signed documents in health care- Analysis and assessment of data formats and transformation. Methods Inf Med 44:520–527, 2005PubMed Hollerbach A, Brandner R, Bess A, Schmücker P, Bergh B: Electronically signed documents in health care- Analysis and assessment of data formats and transformation. Methods Inf Med 44:520–527, 2005PubMed
12.
go back to reference Bicakci K, Baykal N: EVEREST: An efficient method for verification of digital signatures in real-time teleradiology. Stud Health Technol Inform 107(Pt 2):1241–1245, 2004PubMed Bicakci K, Baykal N: EVEREST: An efficient method for verification of digital signatures in real-time teleradiology. Stud Health Technol Inform 107(Pt 2):1241–1245, 2004PubMed
13.
go back to reference Rivest RL, Shamir A, Adleman L: A method for obtaining digital signature and public-key cryptosystems. Commun ACM 21:120–126, 1978CrossRef Rivest RL, Shamir A, Adleman L: A method for obtaining digital signature and public-key cryptosystems. Commun ACM 21:120–126, 1978CrossRef
14.
go back to reference Zhou XQ, Huang HK, Lou SL: Authenticity and integrity of digital mammography images. IEEE Trans Med Imag 20:784–791, 2001CrossRef Zhou XQ, Huang HK, Lou SL: Authenticity and integrity of digital mammography images. IEEE Trans Med Imag 20:784–791, 2001CrossRef
15.
go back to reference Zhou Z: Data security assurance in CAD-PACS integration. Comput Med Imaging Graph 31:353–360, 2007CrossRefPubMed Zhou Z: Data security assurance in CAD-PACS integration. Comput Med Imaging Graph 31:353–360, 2007CrossRefPubMed
16.
go back to reference Kroll M, Schütze B, Geisbe T, Lipinski HG, Grönemeyer DHW, Filler TJ: Embedded systems for signing medical images using the DICOM standard. International Congress Series 1256:849–854, 2003CrossRef Kroll M, Schütze B, Geisbe T, Lipinski HG, Grönemeyer DHW, Filler TJ: Embedded systems for signing medical images using the DICOM standard. International Congress Series 1256:849–854, 2003CrossRef
17.
go back to reference Ruotsalainen P, Manning B: A notary archive model for secure preservation and distribution of electrically signed patient documents. Int J Med Inform 76:449–453, 2007CrossRefPubMed Ruotsalainen P, Manning B: A notary archive model for secure preservation and distribution of electrically signed patient documents. Int J Med Inform 76:449–453, 2007CrossRefPubMed
20.
go back to reference Arnellos A, Lekkas D, Spyrou T, Darzentas J: A framework for the analysis of the reliability of digital signatures for secure e-commerce. The Electronic Journal for E-commerce Tools & Applications (eJETA) 1(4), 2005 Arnellos A, Lekkas D, Spyrou T, Darzentas J: A framework for the analysis of the reliability of digital signatures for secure e-commerce. The Electronic Journal for E-commerce Tools & Applications (eJETA) 1(4), 2005
21.
go back to reference Alsaid A, Mitchell CJ: Dynamic content attacks on digital signatures. Inf Manag Comput Secur 13:328–336, 2005 Alsaid A, Mitchell CJ: Dynamic content attacks on digital signatures. Inf Manag Comput Secur 13:328–336, 2005
22.
go back to reference Jøsang A, AlFayyadh B: Robust WYSIWYS: a method for ensuring that what you see is what you sign. Proceedings of the Sixth Australasian Conference on Information Security 81:53–58, 2008 Jøsang A, AlFayyadh B: Robust WYSIWYS: a method for ensuring that what you see is what you sign. Proceedings of the Sixth Australasian Conference on Information Security 81:53–58, 2008
23.
go back to reference Hsiao CH, Hsu TC, Chang J, Yang SJH, Young ST, Chu W: Developing a medical image content repository for E-learning. J Digit Imaging 19:207–215, 2006CrossRefPubMed Hsiao CH, Hsu TC, Chang J, Yang SJH, Young ST, Chu W: Developing a medical image content repository for E-learning. J Digit Imaging 19:207–215, 2006CrossRefPubMed
24.
go back to reference Lien CY, Hsiao CH, Huang LC, Kao T: Authenticity and integrity of portable electronic health records. Proceedings of International Conference on Health Informatics (HEALTHINF 2008) 1:67–71, 2008 Lien CY, Hsiao CH, Huang LC, Kao T: Authenticity and integrity of portable electronic health records. Proceedings of International Conference on Health Informatics (HEALTHINF 2008) 1:67–71, 2008
25.
Metadata
Title
Applying a Presentation Content Manifest for Signing Clinical Documents
Authors
Chung-Yueh Lien
Chia-Hung Hsiao
Lu-Chou Huang
Tsair Kao
Publication date
01-04-2010
Publisher
Springer-Verlag
Published in
Journal of Imaging Informatics in Medicine / Issue 2/2010
Print ISSN: 2948-2925
Electronic ISSN: 2948-2933
DOI
https://doi.org/10.1007/s10278-009-9191-y

Other articles of this Issue 2/2010

Journal of Digital Imaging 2/2010 Go to the issue