Skip to main content

A Personal Health Record System for Emergency Case Management

  • Conference paper
Biomedical Engineering Systems and Technologies (BIOSTEC 2010)

Abstract

Recent trends in healthcare delivery have led to a shift towards a patient-centric care model which depends on the evolution of information access and tools beyond Electronic Health Record (EHR) systems controlled by healthcare providers to Personal Health Record (PHR) systems whose architectures are based on the fundamental assumptions that the complete records are centrally stored and that each patient retains authority over access to any portion of his/her record. PHRs offer significant potential to stimulate transformational changes in emergency healthcare delivery since they can provide a complete picture of a person’s healthcare record when and where needed. However, a security issue of prominent importance arises which is concerned with the process of granting (revoking) authorization to (from) healthcare professionals without the patient’s involvement. This paper presents an approach to automating the authorization propagation process in PHR systems by means of context-aware technology, which is used to regulate user access to data via a fine-grained access control mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Koufi, V., Vassilacopoulos, G.: HDGPortal: A Grid Portal Application for Pervasive Access to Process-Based Healthcare Systems. In: 2nd International Conference in Pervasive Computing Technologies in Healthcare (PervasiveHealth 2008), Tampere, Finland (2008)

    Google Scholar 

  2. Tang, P.C., Ash, J.S., Bates, D.W., Overhage, J.M., Sands, D.Z.: Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption. JAMIA 13(2), 121–126 (2006)

    Google Scholar 

  3. Lauer, G.: Health Record Banks Gaining Traction in Regional Projects (2009), http://www.ihealthbeat.org/features/2009/health-record-banks-gaining-traction-in-regional-projects.aspx

  4. Wiljer, D., Urowitz, S., Apatu, E., DeLenardo, C., Eysenbach, G., Harth, T., Pai, H., Leonard, K.J.: Patient accessible electronic health records: exploring recommendations for successful implementation strategies. J. Med. Internet Res. 10(4) (2008)

    Google Scholar 

  5. Yasnoff, W.A.: Electronic Records are Key to Health-care Reform, BusinessWeek (2008)

    Google Scholar 

  6. Comini, L., Mazzu, M., Scalvini, S.: Security aspects in electronic personal health record: data access and preservation, Digital Prevention Europe, Briefing Paper (2008)

    Google Scholar 

  7. Win, K.T., Susilo, W., Mu, Y.: Personal Health Record Systems and Their Security Protection. J. Med. Syst. 30, 309–315 (2006)

    Article  Google Scholar 

  8. ICW eHealth Framework, Lifesensor (2009), http://idn.icw-global.com/solutions/lifesensor/lifesensor.html

  9. National Institute of Standards and Technology (NIST), Role Based Access Control (RBAC) and Role Based Security, http://csrc.nist.gov/groups/SNS/rbac/

  10. Røstad, L., Nytrø, Ø.: Personalized Access Control for a Personally Controlled Health Record. In: 2nd ACM Workshop on Computer Security Architectures (CSAW 2008), Virginia, USA (2008)

    Google Scholar 

  11. Metavante: In Case of Emergency Personal Health Record, https://www.icephr.com/

  12. My Personal Health Record (MyPHR), http://myphr.ca/

  13. Wikipedia: Emergency Department, http://en.wikipedia.org/wiki/Emergency_department

  14. Java Agent Development Framework, http://jade.tilab.com/

  15. Organization for the Advancement of Structured Information Standards (OASIS): Core and Hierarchical Role Based Access Control (RBAC) Profile of XACML v2.0, http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-rbac-profile1-spec-os.pdf

  16. Java Authentication and Authorization Service, http://java.sun.com/javase/6/docs/technotes/guides/security/jaas/JAASRefGuide.html

  17. U.S. Congress: Health Insurance Portability and Accountability Act (HIPAA) (1996), http://www.hipaa.org

  18. Personal Information Protection and Electronic Documents Act, Second Session, Thirty-sixth Parliament, 48–49, Elizabeth II, 1999–2000, Statutes of Canada (2000)

    Google Scholar 

  19. European Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995)

    Google Scholar 

  20. Bundesdatenschutzgesetz (German Federal Data Protection Act), Bundesgesetzblatt 2001, Nr. 23 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Koufi, V., Malamateniou, F., Vassilacopoulos, G. (2011). A Personal Health Record System for Emergency Case Management. In: Fred, A., Filipe, J., Gamboa, H. (eds) Biomedical Engineering Systems and Technologies. BIOSTEC 2010. Communications in Computer and Information Science, vol 127. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18472-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-18472-7_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-18471-0

  • Online ISBN: 978-3-642-18472-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics