skip to main content
10.1145/1370099.1370103acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Developing a SSE-CMM-based security risk assessment process for patient-centered healthcare systems

Authors Info & Claims
Published:11 May 2008Publication History

ABSTRACT

Information security and privacy are the major concerns in healthcare domain. However, there lacks a comprehensive framework for evaluating the security engineering practices for healthcare systems. Current transition from institution-centered to patient-centered healthcare introduces additional security and privacy problems. With the intensive human (especially the patient) interaction involved in the patient-centered health care systems, information security and privacy can be assured not only by technologies and infrastructure but also by process. This paper develops a mapping from SSE-CMM process areas to the patient-centered healthcare domain aiming at establishing a set of metrics to assess security risks for patient-centered healthcare systems. Based on the mapping, a security risk assessment process is then proposed to evaluate the PHR system (a typical patient-centered healthcare system).

References

  1. Diamond, C. C.: "Private Health Records: Privacy Implications of the Federal Government's Health Information Technology Initiative". (2007)Google ScholarGoogle Scholar
  2. Gerteis, M., etc: "Through the Patient's Eyes: Understanding and Promoting Patient-Centered Care". Jossey-Bass Health Series (2002)Google ScholarGoogle Scholar
  3. HIMSS: "HIMSS PHR Definition and Position Statement". (2007)Google ScholarGoogle Scholar
  4. Boehm, B.: "Tutorial: Software Risk Management". IEEE Computer Society Press (1989) Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Carr, M., Kondra, S., Monarch, I., Ulrich, F., Walker, C.: "Taxonomy-Based Risk Identification". Software Engineering Institute, Technical Report, CMU/SEI-93-TR-0060 (1993)Google ScholarGoogle Scholar
  6. Higuera, R. P., Haimes, Y. Y.: "Software Risk management". Software Enginering Institute, Technical Report, CMU/SEI-96-TR-012 (1996)Google ScholarGoogle Scholar
  7. Williams, R. C., Pandelios, G. J., Behrens, S. G.: "SRE Method Description (Version 2.0) & SRE Team Members Notebook". Software Engineering Institute, Technical Report, CMU/SEI-99-TR-029 (1996)Google ScholarGoogle Scholar
  8. Bröckers, A.: "Process-based software risk assessment". EWSPT4, Noordwijkerhout, The Netherlands (1995)Google ScholarGoogle Scholar
  9. Stølen, K., Braber, F. d., Dimitrakos, T., Fredriksen, R., Gran, B. A., Houmb, S.--H.: "Model-based risk assessment - the CORAS approach". NIK (2002)Google ScholarGoogle Scholar
  10. Aagedal, J. Ø., Braber, F. d., Dimitrakos, T., Gran, B. A., Raptis, D., Stølen, K.: "Model-based Risk Assessment to Improve Enterprise Security". the Fifth International Enterprise Distributed Object Computing Conference, Lausanne, Switzerland (2002) 51--62 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Model Description Document Version 3.0. SSE-CMM Project & ISSEA Team (2003)Google ScholarGoogle Scholar
  12. National Institute of Standards and Technology (NIST). http://www.nist.gov/Google ScholarGoogle Scholar
  13. COBIT, http://www.isaca.org/cobit.htm.Google ScholarGoogle Scholar
  14. 104th, Congress: Heath Insurance Portability and Accountability Act of 1996. Public Law 104-191 (1996)Google ScholarGoogle Scholar
  15. Centers for Medicare & Medicaid Services (CMS), H.: "Health Insurance Reform: Security Standards". In: Services, H. a. H. (ed.): (2003)Google ScholarGoogle Scholar
  16. Office of the Assistant Secretary for Planning and Evaluation, D.: "Standards for Privacy of Individually Identifiable Health Information". In: Services, H. a. H. (ed.): (2000)Google ScholarGoogle Scholar
  17. Gallagher, L. A.: "Privacy and Security Issues for PHRs". (2007)Google ScholarGoogle Scholar
  18. Yang, Y., Bhuta, J., Boehm, B., Port, D. N.: "Value-based processes for COTS-based applications". Software, IEEE 22 (2005) 54--62 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Developing a SSE-CMM-based security risk assessment process for patient-centered healthcare systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WoSQ '08: Proceedings of the 6th international workshop on Software quality
        May 2008
        88 pages
        ISBN:9781605580234
        DOI:10.1145/1370099
        • General Chair:
        • Bernard Wong

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 May 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate7of11submissions,64%

        Upcoming Conference

        ICSE 2025

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader