Table of Contents Author Guidelines Submit a Manuscript
International Journal of Telemedicine and Applications
Volume 2008, Article ID 763534, 9 pages
Research Article

A Tamper-Resistant and Portable Healthcare Folder

1Institut National de Recherche en Informatique et en Automatique (INRIA), Rocquencourt, 78153 Le Chesnay Cedex, France
2SANTEOS SA, Tour Manhattan, 5,6 Place de l'Iris, 92926 Paris la Défense Cedex, France
3Conseil Général des Yvelines, Hôtel du Département, 2 Place André Mignot, 78012 Versailles Cedex, France
4PRISM Laboratory, University of Versailles, 45 avenue des Etats-Unis, 78035 Versailles Cedex, France
5Association Locale de Développement Sanitaire (ALDS ), 25 avenue des Aulnes, 78250 Meulan, France
6Coordination Gérontologique Intercommunale du Territoire Est Yvelines (CoGITEY), 6 avenue du Maréchal Franchet d'Esperey, 78004 Versailles, France
7Gemalto, 6 rue de la Verrerie, 92190 Meudon, France

Received 1 October 2007; Revised 21 March 2008; Accepted 27 May 2008

Academic Editor: Frédérique Laforest

Copyright © 2008 Nicolas Anciaux et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. H. Brown, M. J. Lincoln, P. J. Groen, and R. M. Kolodner, “VistA—U.S. Department of Veterans Affairs national scale HIS,” International Journal of Medical Informatics, vol. 69, no. 2-3, pp. 135–156, 2003. View at Publisher · View at Google Scholar
  2. J.-P. Door, “Information report (in French), Rapport d'information N659, Enregistré à la Présidence de l'Assemblée nationale le 29 janvier 2008, déposé par la Commission des Affaires Culturelles, Familiales et Sociales, sur le dossier médical personnel, et présenté par M. le député Jean-Pierre Door,” 2008. View at Google Scholar
  3. Markle Foundation, “National Survey on Electronic Personal Health Records,” September 2007,
  4. IPSOS, “Opinions et attitudes des médecins et des patients à l'égard du Dossier médical partagé, Rapport Ipsos Santé/ CNAM,” 2003. View at Google Scholar
  5. Computer Security Institute, “CSI/FBI Computer Crime Survey,” 2006,
  6. R. Agrawal, R. J. Bayardo Jr., C. Faloutsos, J. Kiernan, R. Rantzau, and R. Srikant, “Auditing compliance with a hippocratic database,” in Proceedings of the 30th International Conference on Very Large Data Bases (VLDB '04), vol. 30, pp. 516–527, Toronto, Canada, August-September 2004.
  7. European Directive 95/46/EC, “Protection of individuals with regard to the processing of personal data and on the free movement of such data,” Official Journal of the European Communities, no. L. 281, p. 31, November 1995. View at Google Scholar
  8. N. Anciaux, L. Bouganim, H. van Heerde, P. Pucheral, and P. M. G. Apers, “InstantDB: enforcing timely degradation of sensitive data,” in Proceedings of the 24th International Conference on Data Engineering (ICDE '08), Cancun, Mexico, April 2008.
  9. G. Miklau, B. N. Levine, and P. Stahlberg, “Securing history: privacy and accountability in database systems,” in Proceedings of the 3rd Biennial Conference on Innovative Data Systems Research (CIDR '07), Asilomar, Calif, USA, January 2007.
  10. InspireD integrated project,
  11. Eurosmart, Smart USB Token, White Paper, April 2008,
  12. J. Smith, “Smart health care—the next generation,” Smart Card News, vol. 15, no. 12, 2006. View at Google Scholar
  13. Smart card trends, “Infineon provides security chips for largest US patient smart card project,”
  14. B. Blobel and P. Pharow, “A model driven approach for the German health telematics architectural framework and security infrastructure,” International Journal of Medical Informatics, vol. 76, no. 2-3, pp. 169–175, 2007. View at Publisher · View at Google Scholar
  15. U. Mattsson, “Secure.Data Functional Overview,” Protegity Technical Paper TWP-0011, 2000,
  16. J.-J. Vandewalle, “Smart card research perspectives,” in Proceedings of the International Workshop on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices (CASSIS '04), Lecture Notes in Computer Science, pp. 250–256, Marseille, France, March 2004.
  17. PlugDB and DMSP Projects,
  18. L. C. Carrasco, “RDBMS's for Java cards? What a senseless idea !,” ISOL corp. white paper, 1999.
  19. International Standardization Organization, “Integrated Circuit(s) Cards with Contacts—part 7: Interindustry Commands for Structured Card Query Language (SCQL),” ISO/IEC 7816-7, 1999.
  20. MasterCard International, MasterCard Open Data Storage. Technical Specifications, Version 2.0, 2002,
  21. P. Pucheral, L. Bouganim, P. Valduriez, and C. Bobineau, “PicoDBMS: scaling down database techniques for the smartcard,” The International Journal on Very Large Data Bases, vol. 10, no. 2-3, pp. 120–132, 2001. View at Google Scholar
  22. N. Anciaux, C. Bobineau, L. Bouganim, P. Pucheral, and P. Valduriez, “PicoDBMS: validation and experience,” in Proceedings of 27th International Conference on Very Large Data Bases (VLDB '01), pp. 709–710, Roma, Italy, September 2001.
  23. N. Anciaux, L. Bouganim, and P. Pucheral, “Future trends in secure chip data management,” IEEE Data Engineering Bulletin, vol. 30, no. 3, pp. 49–57, 2007. View at Google Scholar
  24. N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, and D. Shasha, “GhostDB: querying visible and hidden data without leaks,” in Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 677–688, Beijing, China, June 2007. View at Publisher · View at Google Scholar
  25. B. Bloom, “Space/time tradeoffs in hash coding with allowable errors,” Communications of the ACM, vol. 13, no. 7, pp. 422–426, 1970. View at Publisher · View at Google Scholar
  26. P. Pucheral and S. Yin, “System and Method of Managing Indexation of Flash Memory,” European patent by Gemalto and INRIA no. 07290567.2, May 2007.
  27. Intel Corporation, “Understanding the Flash Translation Layer (FTL) specification,” 1998. View at Google Scholar
  28. N. Anciaux, L. Bouganim, and P. Pucheral, “Data confidentiality: to which extent cryptography and secured hardware can help,” Annals of Telecommunications, vol. 61, no. 3-4, pp. 267–283, 2006. View at Google Scholar