Attack scenarios for possible misuse of peripheral parts in the German health information infrastructure

Ali Sunyaev, Alexander Kaletsch, Sebastian Dünnebeil, Helmut Krcmar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

This paper focuses on functional issues within the peripheral parts of the German health information infrastructure, which compromise security and patient's information safety or might violate law. Our findings demonstrate that a misuse of existing functionality is possible. With examples and detailed use cases we show that the health infrastructure can be used for more than just ordinary electronic health care services. In order to investigate this evidence from the laboratory, we tested all attack scenarios in a typical German physician's practice. Furthermore, security measures are provided to overcome the identified threats and questions regarding these issues are discussed.

Original languageEnglish
Title of host publicationICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems
Pages229-235
Number of pages7
StatePublished - 2010
Event12th International Conference on Enterprise Information Systems, ICEIS 2010 - Funchal, Portugal
Duration: 8 Jun 201012 Jun 2010

Publication series

NameICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems
Volume1 DISI

Conference

Conference12th International Conference on Enterprise Information Systems, ICEIS 2010
Country/TerritoryPortugal
CityFunchal
Period8/06/1012/06/10

Keywords

  • Electronic health card
  • Health information infrastructure
  • Security analysis

Fingerprint

Dive into the research topics of 'Attack scenarios for possible misuse of peripheral parts in the German health information infrastructure'. Together they form a unique fingerprint.

Cite this