Skip to main content

Advertisement

Log in

The Current and Future Needs of Our Medical Systems

  • Education & Training
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

As another publishing year come to a close at the Journal of Medical Systems, it is clear that as a scientific community, the need for a more detailed understanding of the impact of medical systems has never been greater. Technologies that were emerging just a short time ago including radio frequency identification (RFID), wireless body area networks (WBAN), and telecare medicine information systems (TMIS) are now ubiquitous. Additionally, closed-loop controller systems have gained regulatory approval in many settings. As the complexity of these medical systems grow, so to do the challenges of ensuring we have secure, efficient, and reliable systems that integrate into our clinical workflows.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Zailani, S., Iranmanesh, M., Nikbin, D., and Beng, J. K., Determinants of RFID Adoption in Malaysia′s Healthcare Industry: Occupational Level as a Moderator. Journal of Medical Systems 39(1):172, 2015. doi:10.1007/s10916-014-0172-4.

    Article  Google Scholar 

  2. Guedon, A. C., Wauben, L. S., de Korne, D. F., Overvelde, M., Dankelman, J., and van den Dobbelsteen, J. J., A RFID Specific Participatory Design Approach to Support Design and Implementation of Real-Time Location Systems in the Operating Room. Journal of Medical Systems 39(1):168, 2015. doi:10.1007/s10916-014-0168-0.

    Article  Google Scholar 

  3. Srivastava, K., Awasthi, A. K., Kaul, S. D., and Mittal, R. C., A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System. Journal of Medical Systems 39(1):153, 2015. doi:10.1007/s10916-014-0153-7.

    Article  Google Scholar 

  4. Taylor, D., RFID in the pharmaceutical industry: addressing counterfeits with technology. Journal of Medical Systems 38(11):141, 2014. doi:10.1007/s10916-014-0141-y.

    Article  Google Scholar 

  5. He, D., Kumar, N., Chilamkurti, N., and Lee, J. H., Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. Journal of Medical Systems 38(10):116, 2014. doi:10.1007/s10916-014-0116-z.

    Article  Google Scholar 

  6. Ko, W. T., Chiou, S. Y., Lu, E. H., and Chang, H. K., Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety. Journal of Medical Systems 38(9):66, 2014. doi:10.1007/s10916-014-0066-5.

    Article  Google Scholar 

  7. Zhao, Z., A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem. Journal of Medical Systems 38(5):46, 2014. doi:10.1007/s10916-014-0046-9.

    Article  Google Scholar 

  8. Zhang, Z., and Qi, Q., An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography. Journal of Medical Systems 38(5):47, 2014. doi:10.1007/s10916-014-0047-8.

    Article  MathSciNet  Google Scholar 

  9. Rosenbaum, B. P., Radio frequency identification (RFID) in health care: privacy and security concerns limiting adoption. Journal of Medical Systems 38(3):19, 2014. doi:10.1007/s10916-014-0019-z.

    Article  Google Scholar 

  10. Lai, H. M., Lin, I. C., and Tseng, L. T., High-level managers′ considerations for RFID adoption in hospitals: an empirical study in Taiwan. Journal of Medical Systems 38(2):3, 2014. doi:10.1007/s10916-013-0003-z.

    Article  Google Scholar 

  11. Latif, R., Abbas, H., and Assar, S., Distributed denial of service (DDoS) attack in cloud- assisted wireless body area networks: a systematic literature review. Journal of Medical Systems 38(11):128, 2014. doi:10.1007/s10916-014-0128-8.

    Article  Google Scholar 

  12. Ali, A., and Khan, F. A., A broadcast-based key agreement scheme using set reconciliation for wireless body area networks. Journal of Medical Systems 38(5):33, 2014. doi:10.1007/s10916-014-0033-1.

    Article  Google Scholar 

  13. Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. Journal of Medical Systems 38(2):13, 2014. doi:10.1007/s10916-014-0013-5.

    Article  Google Scholar 

  14. Arshad, H., and Nikooghadam, M., Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems. Journal of Medical Systems 38(12):136, 2014. doi:10.1007/s10916-014-0136-8.

    Article  Google Scholar 

  15. Giri, D., Maitra, T., Amin, R., and Srivastava, P. D., An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems. Journal of Medical Systems 39(1):145, 2015. doi:10.1007/s10916-014-0145-7.

    Article  Google Scholar 

  16. Maitra, T., and Giri, D., An efficient biometric and password-based remote user authentication using smart card for Telecare Medical Information Systems in multi-server environment. Journal of Medical Systems 38(12):142, 2014. doi:10.1007/s10916-014-0142-x.

    Article  Google Scholar 

  17. Wen, F., and Guo, D., An improved anonymous authentication scheme for telecare medical information systems. Journal of Medical Systems 38(5):26, 2014. doi:10.1007/s10916-014-0026-0.

    Article  Google Scholar 

  18. Kim, K. W., and Lee, J. D., On the security of two remote user authentication schemes for telecare medical information systems. Journal of Medical Systems 38(5):17, 2014. doi:10.1007/s10916-014-0017-1.

    Article  Google Scholar 

  19. Siddiqui, Z., Abdullah, A. H., Khan, M. K., and Alghamdi, A. S., Smart environment as a service: three factor cloud based user authentication for telecare medical information system. Journal of Medical Systems 38(1):9997, 2014. doi:10.1007/s10916-013-9997-5.

    Article  Google Scholar 

  20. Marsh, W. I., and Smith, W. D., A flexible system for closed-loop ventilator development. Journal of Medical Systems 6(1):53–59, 1982.

    Article  Google Scholar 

  21. Mat Kiah, M. L., Al-Bakri, S. H., Zaidan, A. A., Zaidan, B. B., and Hussain, M., Design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture. Journal of Medical Systems 38(10):133, 2014. doi:10.1007/s10916-014-0133-y.

    Article  Google Scholar 

  22. Mishra, D., Srinivas, J., and Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. Journal of Medical Systems 38(10):120, 2014. doi:10.1007/s10916-014-0120-3.

    Article  Google Scholar 

  23. Wen, F., A more secure anonymous user authentication scheme for the integrated EPR information system. Journal of Medical Systems 38(5):42, 2014. doi:10.1007/s10916-014-0042-0.

    Article  Google Scholar 

  24. Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., and He, L., A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems. Journal of Medical Systems 38(1):9994, 2014. doi:10.1007/s10916-013-9994-8.

    Article  Google Scholar 

  25. Pelone, F., Kringos, D. S., Romaniello, A., Archibugi, M., Salsiri, C., and Ricciardi, W., Primary care efficiency measurement using data envelopment analysis: a systematic review. Journal of Medical Systems 39(1):156, 2015. doi:10.1007/s10916-014-0156-4.

    Article  Google Scholar 

  26. Deidda, M., Lupianez-Villanueva, F., Codagnone, C., and Maghiros, I., Using data envelopment analysis to analyse the efficiency of primary care units. Journal of Medical Systems 38(10):122, 2014. doi:10.1007/s10916-014-0122-1.

    Article  Google Scholar 

  27. Wu, Z. Y., Chen, L., and Wu, J. C., A reliable RFID mutual authentication scheme for healthcare environments. Journal of Medical Systems 37(2):9917, 2013. doi:10.1007/s10916-012-9917-0.

    Article  Google Scholar 

  28. Silva, L. A., Campos, S., Costa, C., and Oliveira, J. L., Sensor-based architecture for medical imaging workflow analysis. Journal of Medical Systems 38(8):63, 2014. doi:10.1007/s10916-014-0063-8.

    Article  Google Scholar 

  29. Bouzguenda, L., and Turki, M., Designing an architectural style for dynamic medical Cross-Organizational Workflow management system: an approach based on agents and web services. Journal of Medical Systems 38(4):32, 2014. doi:10.1007/s10916-014-0032-2.

    Article  Google Scholar 

  30. Tseng, C. E., Chiang, H. H., Shih, L. Y., and Liao, K. S., The feasibility of computer-aided monitoring of the workflow in surgical pathology: a five-year experience. Journal of Medical Systems 38(2):14, 2014. doi:10.1007/s10916-014-0014-4.

    Article  Google Scholar 

  31. Kumari, S., Khan, M. K., and Kumar, R., Cryptanalysis and Improvement of ′A Privacy Enhanced Scheme for Telecare Medical Information Systems′. Journal of Medical Systems 37(4):9952, 2013. doi:10.1007/s10916-013-9952-5.

    Article  Google Scholar 

  32. Lee, T.-F., An Efficient Chaotic Maps-Based Authentication and Key Agreement Scheme Using Smartcards for Telecare Medicine Information Systems. Journal of Medical Systems 37(6):9985, 2013. doi:10.1007/s10916-013-9985-9.

    Article  Google Scholar 

  33. Das, A. K., and Bruhadeshwar, B., An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System. Journal of Medical Systems 37(5):9969, 2013. doi:10.1007/s10916-013-9969-9.

    Article  Google Scholar 

  34. Castro, L., Lefebvre, E., and Lefebvre, L. A., Adding Intelligence to Mobile Asset Management in Hospitals: The True Value of RFID. Journal of Medical Systems 37(5):9963, 2013. doi:10.1007/s10916-013-9963-2.

    Article  Google Scholar 

  35. Robinson, R. L., and Burk, M. S., Tablet Computer Use by Medical Students in the United States. Journal of Medical Systems 37(4):9959, 2013. doi:10.1007/s10916-013-9959-.

    Article  Google Scholar 

  36. Wu, F., and Xu, L., Security Analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems 37(4):9958, 2013. doi:10.1007/s10916-013-9958-z.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jesse M. Ehrenfeld.

Additional information

This article is part of the Topical Collection on Education & Training

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ehrenfeld, J.M. The Current and Future Needs of Our Medical Systems. J Med Syst 39, 16 (2015). https://doi.org/10.1007/s10916-015-0212-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-015-0212-8

Keywords

Navigation