Skip to main content

Modelling a User Authorisation and Data Access Framework for Multi-specialty Research Systems in Secondary Health Care

  • Conference paper
Electronic Healthcare (eHealth 2011)

Abstract

Patient identification and consequent recruitment in clinical trials is normally preceded with searches on electronic health record (EHR) systems. Query results may be collated across multiple health organisations and specialties. In such scenarios, a prime concern is the possibility of systems and their users inadvertently or otherwise impinging on the privacy of patients. Access to patient data is crucial for research purposes, but the degree of access must be controlled in such a way that it conforms to agreed legal, organisational and ethical policies. In this paper, we present a proposed model for managing a dynamic matrix of roles and data access privileges within the context of research systems in secondary care.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Becker, M.Y., Sewell, P.: Cassandra: Flexible Trust Management, Applied to Electronic Health Records. In: Computer Security Foundations Workshop, pp. 139—154 (2004)

    Google Scholar 

  2. Sandu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29, 38–47 (1996)

    Article  Google Scholar 

  3. Ferraiolo, D.F., Kuhn, D.R.: Role Based Access Controls. In: 15th National Computer Security Conference, pp. 554–563 (1992)

    Google Scholar 

  4. Slevin, L.A., Macfie A.: Role Based Access Control for a Medical Database. In: IASTED-Software Engineering and Applications Conference, pp. 19–21 (2007)

    Google Scholar 

  5. Covington, M.J., Moyer, M.J., Ahamad, M.: Generalized Role-Based Access Control for Securing Future Applications. Technical Report GIT-CC-00-02. Georgia Institute of Technology (2000)

    Google Scholar 

  6. PERMIS. FAQ (2011), http://sec.cs.kent.ac.uk/permis/documents/FAQ.shtml

  7. Snaith, R.P.: The Hospital Anxiety and Depression Scale. Health Qual. Life Outcomes 1, 29 (2003)

    Google Scholar 

  8. National programme for IT (NPfIT), http://www.gpchoice.org/npfit.aspx

  9. Blobel, B.: Authorisation and Access Control for Electronic Health Record Systems. International Journal of Medical Informatics 73, 251–257 (2004)

    Article  Google Scholar 

  10. HL7. Privacy, Access and Security Services (PASS) Access Control Services Conceptual Model. Release 1 (2010), http://hssp-security.wikispaces.com/PASS+HL7+Balloted+Documents

  11. Farzad, F., Yu, E., Hung, P.C.K.: Role Based Access Control Requirements Model with Purpose Extension. In: Workshop on Requirements Engineering, pp. 207–216 (2007)

    Google Scholar 

  12. Crook, R., Ince, D., Nuseibeh, B.: Modelling Access Policies Using Roles in Requirements Engineering. Information and Software Technology 45(14), 979–991 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Ogunsina, I., Lim Choi Keung, S.N., Zhao, L., Langford, G., Tyler, E., Arvanitis, T.N. (2012). Modelling a User Authorisation and Data Access Framework for Multi-specialty Research Systems in Secondary Health Care. In: Kostkova, P., Szomszor, M., Fowler, D. (eds) Electronic Healthcare. eHealth 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 91. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29262-0_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29262-0_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29261-3

  • Online ISBN: 978-3-642-29262-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics