1
artículo
Publicado 2023
Enlace
Enlace
The main objective of this paper is the development of a model that allows the authentication of a user for access control using the Two-Factor Authentication model. For the development of such a model we present a secure two-factor authentication (TFA) scheme based on the user's possession of a password and a cryptographically capable device. The security of this model is end-to-end in the sense that whoever wants to access in a fraudulent way is going to find it difficult and thus guarantee the security of the user of the system, the algorithm used was Cryptographic Networks, which is a double authentication model. Also the programming language cakephp 4.0 was used, in addition to using the visual studio code program to perform the algorithms required for the double authentication model to work.
2
artículo
Publicado 2024
Enlace
Enlace
This article addresses the protection of medical data in health information systems, focusing on the growing adoption of electronic health records (EHRs). It recognises the security challenges inherent in centralised systems and advocates for the secure exchange of medical data. The methodology follows the principles of the PRISMA statement, using search engines such as SCOPUS, PUBMED and IEEE XPLORE to identify 20 relevant documents. These papers focus on key attributes of blockchain technology: access control, data privacy, data security and encryption. The results indicate that access control is the most recurring attribute, followed by data privacy, data security and encryption. The discussion highlights the practical applicability of these attributes, improving patient confidence and medical workflow efficiency. The conclusions affirm the relevance of the blockchain in medical data ...