skip to main content
10.1145/1183568.1183577acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
Article

Policy-based security management for federated healthcare databases (or RHIOs)

Published:11 November 2006Publication History

ABSTRACT

The role of security management in the RHIOs has recently gained increasing attention due to strict privacy and disclosure rules, and federal regulations such as HIPAA. The envisioned use of electronic health care records in such systems involves pervasive and ubiquitous access to healthcare information from anywhere outside of traditional hospital boundaries which puts increasing demands on the underlying security mechanisms. In this paper, we have designed a context-aware policy-based system to provide security management for health informatics. The policies are based on a set of use cases developed for the HL7 Clinical Document Architecture (CDA) standard. Our system is designed to adapt well to ubiquitous healthcare services in a non-traditional, pervasive environment using the same infrastructure that enables federated healthcare management for traditional organizational boundaries. We also present an enforcement architecture and a demonstration prototype for the policy-based system proposed in this paper.

References

  1. Bartschat W, Burrington-Brown J, Carey S, Chen J, Deming S, Durkin S et al. Surveying the RHIO landscape. A description of current RHIO models, with a focus on patient identification. J AHIMA 2006; 77(1):64A-64D.Google ScholarGoogle Scholar
  2. Conn J. Destination RHIO. As regional data networks continue to grow in number, some find financial strength. Mod Healthc 2005; 35(42):28, 32.Google ScholarGoogle Scholar
  3. Clement J. McDonald, J. Marc Overhage, Michael Barnes, Gunther Schadow, Lonnie Blevins, Paul R. Dexter, Burke Mamlin. Indiana Network For Patient Care: A Working Local Health Information Infrastructure. Health Affairs, September/October 2005.Google ScholarGoogle Scholar
  4. Terry K. Why these docters love their RHIO. Med Econ 2005; 82(19):TCP8, TCP10, TCP12.Google ScholarGoogle Scholar
  5. Leviss J. Identity and access management: the starting point for a RHIO. Health Manag Technol 2006; 27(1):64, 63.Google ScholarGoogle Scholar
  6. R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, "Hippocratic Databases", In Proceedings of the 28th Int'l Conf. on Very Large Databases (VLDB), Hong Kong, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. IBM. The Enterprise Privacy Authorization Language (EPAL). Available at www.zurich.ibm.com/security/enterprise-privacy/epal.Google ScholarGoogle Scholar
  8. M. Mont, R. Thyne, K. Chan, P. Bramhall, "Extending HP Identity Management Solutions to Enforce Privacy Policies and Obligations for Regulatory Compliance by Enterprises", HP Laboratories Technical Report 2005--110.Google ScholarGoogle Scholar
  9. A. M. Snyder, A. C. Weaver, "The elogistics of Securing Distributed Medical Data," IEEE International Conference on Industrial Informatics, Banff, Alberta, Canada, August 20-25, 2003.Google ScholarGoogle Scholar
  10. A.C. Weaver, S. J. Dwyer III, A. M. Snyder, et al., "Federated, Secure Trust Networks for Distributed Healthcare IT Services," IEEE International Conference on Industrial Informatics, August 2003, Alberta, Canada.Google ScholarGoogle Scholar
  11. World Wide Web Consortium (W3C). Platform for Privacy Preferences (P3P). Available at www.w3.org/P3P.Google ScholarGoogle Scholar
  12. W. Pratt, K. Unruih, A. Civan, M. Skeels, "Personal Health Information Management", Communications of the ACM,Vol. 49,No. 1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. Fankhauser, G. Gardarin, M. Lopez, J. Munoz, A. Tomasic, "Experiences in Federated Databases: From IRO-DB to MIRO-Web", Proceedings of the 24th VLDB Conference, New York, USA, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Heimbigner, D. McLeod, "A federated architecture for information management", ACM Transactions on Information Systems (TOIS), Volume 3, Issue 3, July 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Tempelton, D. Brill, A. Chen, S. Dao, E. Lund, "Mermaid: Experiences with network operation". In Proceedings of the 2nd International Conference on Data Engineering 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Tomasic, L. Raschid, "Scaling Access to Heterogeneous Data Sources with Disco", IEEE Transactions on Knowledge and Data Engineering, Vol 10, No 5, September/October 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. Dolin, L. Alschuler, S. Boyer, C. Beebe, F. Behlen, P. Biron, Editors, HL7 Clinical Document Architecture, Release 2.0, August 2004.Google ScholarGoogle Scholar
  18. L. Alschuler, "Layered Constraints: The Proposal for HL7 Healthcare Templates", XML 2002, Baltimore, MD.Google ScholarGoogle Scholar
  19. F. Moss, "Clinical Record Use Cases", OASIS XACML Technical Committee, 2001.Google ScholarGoogle Scholar
  20. R. S. Sandhu, E.J. Coyne, H.L. Feinstein, C.E. Youman, "Role-Based Access Control Models", IEEE Computer 29(2) Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. R. Bhatti, J. B. D. Joshi, E. Bertino, A. Ghafoor, "X-GTRBAC: An XML-based Policy Specification Framework and Architecture for Enterprise-Wide Access Control", ACM Transactions on Information and System Security (TISSEC),Vol. 8, No. 2. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Policy-based security management for federated healthcare databases (or RHIOs)

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          HIKM '06: Proceedings of the international workshop on Healthcare information and knowledge management
          November 2006
          66 pages
          ISBN:1595935282
          DOI:10.1145/1183568
          • Program Chairs:
          • Li Xiong,
          • Yuni Xia

          Copyright © 2006 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 November 2006

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate32of70submissions,46%

          Upcoming Conference

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader