• May 15, 2019 News!Vol.7, No.5- Vol.8, No.4 has been indexed by EI (Inspec).   [Click]
  • Aug 01, 2018 News! [CFP] 2020 the annual meeting of IJMO Editorial Board, ECDMO 2020, will be held in Athens, Greece, February 15-17, 2020.   [Click]
  • Sep 30, 2019 News!Vol 9, No 6 has been published with online version. 12 original aritcles from 6 countries are published in this issue.    [Click]
General Information
    • ISSN: 2010-3697  (Online)
    • Abbreviated Title: Int. J. Model. Optim.
    • Frequency: Bimonthly
    • DOI: 10.7763/IJMO
    • Editor-in-Chief: Prof. Adrian Olaru
    • Executive Editor: Ms.Yoyo Y. Zhou
    • Abstracting/ Indexing: ProQuest, Crossref, Electronic Journals Library, Google Scholar, EI (INSPEC, IET), EBSCO, etc.
    • E-mail ijmo@iacsitp.com
Prof. Adrian Olaru
University Politehnica of Bucharest, Romania
I'm happy to take on the position of editor in chief of IJMO. It's a journal that shows promise of becoming a recognized journal in the area of modelling and optimization. I'll work together with the editors to help it progress.
IJMO 2012 Vol.2(3): 202-207 ISSN: 2010-3697
DOI: 10.7763/IJMO.2012.V2.111

Privacy Assurance and Fraud Detection in Healthcare Engineering

Chandrasekaran Subramaniam, Niveditha Narendhran, and Mohammed Nazim Feroz

Abstract—The objective of the paper is to propose a privacy centered process model for healthcare information system focusing on the trust between the entities, security methods and the resulting privacy assurance in the health information. The work addresses the criticality of the medical data and an adaptable security mechanism to prevent anticipated security risk in disclosing the allowable information. The trust between various covered entities including medical insurance agents is managed by a dynamic trust evaluation method in different process. The collaboration of various objects through inter process communication is achieved to determine the needed security method by an object in a different process. The permitted colored tokens help to detect the intruder or a fraud in submitting the same medical case many times. The cyclic processes and sub processes are simulated not only to determine the utilization of various resources of healthcare information system but also the sensitivity of the system in different scenarios.

Index Terms—Adaptable security, covered entity, fraud detection, process, resource utilization.

C. Subramaniam is with the Department of Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, Tamil Nadu, 641006, India (e-mail: chandrasekaran.s@msn.com).
N. Narendhran is with the Department of Computer Science, Polytechnic Institute of NewYork University, Brooklyn, NY 11201, USA. (e-mail: nivy_ganguly@yahoo.co.in).
M. N. Feroz is with the Electrical Engineering Department, Texas Tech University, Lubbock, TX 79409 USA, (e-mail: nazimatr@gmail.com).


Cite: Chandrasekaran Subramaniam, Niveditha Narendhran, and Mohammed Nazim Feroz, "Privacy Assurance and Fraud Detection in Healthcare Engineering," International Journal of Modeling and Optimization vol. 2, no. 3, pp. 202-207, 2012.

Copyright © 2008-2019. International Journal of Modeling and Optimization. All rights reserved.
E-mail: ijmo@iacsitp.com