Skip to main content

Medical Database Security

  • Conference paper

Part of the book series: Informatik-Fachberichte ((INFORMATIK,volume 258))

Abstract

Medical database2) security aims, generally speaking, at

  • high availability, accuracy, integrity and consistency of stored data, as well as at

  • medical professional secrecy and confidentiality (oath of Hippokrates), and

  • privacy as the individuals constitutional right of ‘informational self-determination’ [Co74, Bvg83], in particular to determine and to effectively supervise the collection, maintenance, use, dissemination, and deletion of their data.

A first version of this paper was presented at EC.AIM Working Conference on Data Protection and Confidentiality in Health Informatics, Brussels, March 19–21, 1990.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atkinson, M., Banciltion, F., DeWitt, D., Dittrich, K., Maier, D., Zdonik, S., The object-oriented database system manifesto, Proc. 1st Inf. Conf. on Deductive and Object-Oriented Databases, Kyoto, Japan, 1989.

    Google Scholar 

  2. Bakker, A.R., Practical Aspects of Data Protection in a Hospital Information System, in: Data Protection in Health Information Systems — Where do we stand ?, North-Holland, 1983, 169–180.

    Google Scholar 

  3. Bakker, A.R., Louwerse, C.P., Kouwenberg, J.M.L., Data Integrity in an Integrated Hospital Information System, Practical Experiences, MEDINFO-83, North-Holland, 959–962.

    Google Scholar 

  4. Beier, B., Datenschutz in dem medizinischen Informationssystem BAIK, Part 1: Datenschutz und Datensicherung, 1983, 245–250

    Google Scholar 

  5. Beier, B., Datenschutz in dem medizinischen Informationssystem BAIK, Part 2: Datenschutz und Datensicherung, 1984, 109–116.

    Google Scholar 

  6. Beier, B., Das medizinische Informationssystem BAIK im Spiegel des Datenschutzes, Proc. 29. Jahrestagung GMDS, Frankfurt, Medizinische Informatik und Statistik 58, Springer, 421–428.

    Google Scholar 

  7. Bell, D.E., LaPadula, L.J., Secure Computer Systems, Mitre Corporation, Bedford, 1974.

    Google Scholar 

  8. Biskup, J., Brüggemann, H.H., The Personal Model of Data — Towards a Privacy-Oriented Information System, Computers & Security, Vol.7 (1988), 575–597.

    Article  Google Scholar 

  9. Biskup, J., Privacy Respecting Permissions and Rights, in [La 88], 173–185.

    Google Scholar 

  10. Biskup, J., Protection of privacy and confidentiality in medical information systems: problems and guidelines, in [LaSp90], to appear.

    Google Scholar 

  11. Biskup, J., A general framework for database security, draft paper, Hildesheim, 1990.

    Google Scholar 

  12. Brüggemann, H.H., Interaction of authorities and acquaintances in the DORIS privacy model of data, Proc. MFDBS 89, Lecture Notes in Computer Science 364, Springer, 1989, pp. 85 – 99.

    Google Scholar 

  13. Bundesverfassungsgericht, Urteil vom 15. Dezember zum Volkszählungsgesetz 1983 (in German), Bundesanzeiger 35, 241a (1983).

    Google Scholar 

  14. Chen, P.P.-S., The entity-relationship-model — towards a unified view of data, ACM Transactions on Database Systems 1 (1976), pp. 9–36.

    Article  Google Scholar 

  15. Chaum, D.L., Untraceable electronic mail, return addresses and digital pseudonyms, Communications of the ACM 24 (1981), no. 2, 84 – 88.

    Article  Google Scholar 

  16. Chaum, D.L., Security without identification: transaction systems to make big brother obsolete, Communications of the ACM 28 (1985), no. 10, 1030 – 1044.

    Article  Google Scholar 

  17. Clark, D.D., Wilson, D.R., A comparison of commercial and military computer security policies, Proc. IEEE Symp. on Security and Privacy, 1987, Oakland, CA, 184–194.

    Google Scholar 

  18. Congress, 93rd — 2nd Session, Privacy Act of 1974, Public Law 93 – 579.

    Google Scholar 

  19. Dobson, J., Security and Databases: A Personal View, in [La 88], 11–21.

    Google Scholar 

  20. Department of Defense Computer Science Security Center, Trusted Computer Science Systems Evaluation Criteria, CSC-STD-011-83, Fort Meode, 1983.

    Google Scholar 

  21. Dobson, J. E., McDermid, J. A., Security Models and Enterprise Models in [La89], 1–39.

    Google Scholar 

  22. Eys, J. van, Confidentiality of medical records in pediatric cancer care, The American Journal of Pediatric Hematology/Oncology 6 (1984), no. 4, 415 – 423.

    Article  Google Scholar 

  23. Fugini, M., Secure database development methodologies, in Landwehr, C.E. (ed.), Database Security: Status and Prospects, North-Holland, 1988; [La88], 103–129.

    Google Scholar 

  24. Giere, W., BAIK-Befunddokumentation und Arztbrief schreibung im Krankenhaus, Media, Taunusstein, 1986.

    Google Scholar 

  25. Glasgow, J., MacEwen, G., Panangoden, P., Security by permission in databases, in [La89], 197 – 205.

    Google Scholar 

  26. Griesser, G., Jardel, J.P., Kenny, D.J., Sauter, K., Data Protection in Health Information Systems — Where do we stand? Proc. IFIP — IMIA WG 4 Working Conf., Kiel, Sept. 1982, North-Holland, 1983.

    Google Scholar 

  27. Haigh, J.T., Modeling database security requirements, in [La 88], 45–56.

    Google Scholar 

  28. Haas, P., Möhr, J.R., Sawinski, R., Wiederspohn, J., Victor, N., EDV-Gesamtkonzept Universitätsklinikum Heidelberg, Proc. 31. Jahrestagung GMDS, 1986, Göttingen, Medizinische Informatik und Statistik 64, Springer, 265–268.

    Google Scholar 

  29. Hull, R., King, R., Semantic database modeling: survey, applications, and research issues, ACM Computing Surveys 19 (1987), pp. 201–260.

    Article  Google Scholar 

  30. Landwehr, C.E. (ed.), Database Security: Status and Prospects, North-Holland, 1988.

    MATH  Google Scholar 

  31. Landwehr, C.E. (ed.), Database Security II: Status and Prospects, North-Holland, 1989.

    Google Scholar 

  32. Landwehr, C.E., Spooner, D. (eds.) Database Security III: Status and Prospects, North-Holland, 1990, to appear.

    Google Scholar 

  33. Lochovsky, F.H., Woo, C.C., Role-based security in data base management systems, in [La 88], 209–222.

    Google Scholar 

  34. Louwerse, C.P., Bakker, A.R., Kouwenberg, J.M.L., Data Protection in a Large Hospital Information System: A Case Study on Implemented Measures and Experiences, MEDINFO 86, North-Holland, 834–838.

    Google Scholar 

  35. Louwerse, C.P., Kouwenberg, J.M.L., Data Protection Aspects in an Integrated Hospital Information System, Computers & Security, Vol.3 (1984), 286–294.

    Article  Google Scholar 

  36. Louwerse, C.P., Zanden, H.G.M. van der, Impact of a Hospital Information System on Hospital Organization, Medical Informatics Europe 1984, Lecture Notes in Medical Informatics 24, 693–698.

    Google Scholar 

  37. MacEwen, G.H., Effects of distributed system technology on database security, in [La 88], 253–261.

    Google Scholar 

  38. Marel, J. van der, Bakker, A.R., User Accessrights in an Integrated Hospital Information System, MEDINFO-83, North-Holland, 963–966

    Google Scholar 

  39. Möhr, J.R., Haas P., Sawinski, R., Wiedersphon, J., Victor, N., EDV-Gesamtkonzeption-Klinikum der Ruprecht-Karls-Universität Heidelberg, Universität Heidelberg, 1986.

    Google Scholar 

  40. Peckham, J., Maryanski, F., Semantic data models, ACM Computing Surveys 20 (1988), pp. 153–189.

    Article  MATH  Google Scholar 

  41. Reichertz, P.L., Datenschutz- und Vertraulichkeitsprobleme medizinischer Daten für Krankenversorgung und Forschung, Münch. med. Wschr. 126 (1984) Nr. 8, Medizin Verlag, 1984.

    Google Scholar 

  42. Selmer, K.S., Legal and social aspects of medical informatics, Proc. Medical Informatics Europe 1988, Lecture Notes in Medical Informatics 35, 42–48.

    Google Scholar 

  43. Sheth, A.P., Heterogeneous distributed databases: issues in integration, Tutorial IEEE 5th Int. Conf. on Data Engineering, Los Angeles, Febr. 1989.

    Google Scholar 

  44. Sawinski, R., Haas, P., Interaktive Definition und Pflege von datenschutzorientierten Benutzerschnittstellen, Proc. 31. Jahrestagung GMDS, 1986, Göttingen, Medizinische Informatik undStatistik 64, Springer, 295–298.

    Google Scholar 

  45. Schneider, W., Impact of Distributed Health Databases on Usage Integrity, in: Data Protection in Health Information Systems — Where do we stand?, North-Holland 1983, 119–129.

    Google Scholar 

  46. Schneider, W., Strategies for Future Systems Architecture and Development: The federalistic approach, Proc. Medical Informatics Europe 1988, Lecture Notes in Medical Informatics 35, 42–48.

    Google Scholar 

  47. Stromberg, C.D., Access to hospital information: problems and strategies, Frontiers of Health Services Management 4 (1987), 3–33.

    Google Scholar 

  48. Ting, T.C., A user-role based data security approach, in [La 88], 187–208.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1990 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Biskup, J. (1990). Medical Database Security. In: Reuter, A. (eds) GI — 20. Jahrestagung II. Informatik-Fachberichte, vol 258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-76119-5_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-76119-5_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-53213-2

  • Online ISBN: 978-3-642-76119-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics