skip to main content
10.1145/1370905.1370907acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Introducing privacy in a hospital information system

Published:17 May 2008Publication History

ABSTRACT

Security and privacy issues in healthcare data management play a fundamental role in the widespread adoption of medical information systems. As a consequence, it is very important to define the right means for expressing and managing policies in order to comply with privacy-related standards and regulations.

In this work, we extend an open source hospital information system in order to provide support for expressing and enforcing privacy-related policies, using as a starting point a conceptual model the authors developed in a previous work.

References

  1. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities of 23 November 1995 No L. 281 p. 31Google ScholarGoogle Scholar
  2. Decreto Legislativo n. 196, 30 Giugno 2003, Codice in materia di protezione dei dati personali, Gazzetta Ufficiale n. 174 del 29-7-2003 - Suppl. Ord. n. 123 http://www.hipaa.orgGoogle ScholarGoogle Scholar
  3. A. Coen-Porisini, P. Colombo, S. Sicari, A. Trombetta. A Conceptual Model for Privacy Policies. In Proc. of Software Engineering Application (SEA'07), Cambridge, Boston, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Q. Ni, A. Trombetta, E. Bertino, and J. Lobo. Privacyaware Role-Based Access Control. In Proc. of ACM Symp. on Access Control Methods And Technologies (SACMAT'07), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. V. Lamsweerde and E. Letier. Handling Obstacles in Goal-Oriented Requirement Engineering. IEEE Trans. Soft. Eng, 26:978--1005, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. L. Liu, E. Yu, and J. Mylopoulos. Analyzing Security Requirements as Relationships among Strategic Actors. In SREIS'02, e-proceedings, Raleigh, 2002.Google ScholarGoogle Scholar
  7. H. Mouratidis, P. Giorgini, and G. Mason. Integrating Security and Systems Engineering towards the Modelling of Secure Information System. In 15th Int. Conf. of Advanced Info. System Engineering (CAiSE'03), vol. 2681 of LNCS, pages 63--78. Springer-Verlang, Berlin, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. H. Mouratidis, P. Giorgini, and G. A. Manson. An Ontology for Modelling Security: The Tropos Approach. In V. Palade, R. J. Howlett, and L. C. Jain, editors, KES, vol. 2773 of Lecture Notes in Computer Science, pages 1387--1394. Springer, 2003.Google ScholarGoogle Scholar
  9. L. Chung. Dealing with Security Requirements during the Development of Information System. In 5th Int. Conf. of Advanced Info.System Engineering (CaiSE'93), Paris (France). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Mylopolulos, L. Chung, and B. Nixon. Representing and Using non Functional Requirements: a Process Oriented Approach. IEEE Trans. Soft. Eng., 18:483--497, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Anton. Goal-Based Requirements Analysis. In 2nd IEEE Int. Conf. on Requirements Engineering (ICRE'96), pages 136--144, Colorado Springs Co, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. E. Kavakli, C. Kalloniatis, P. Loucopoulos, and S. Gritzalis. Incorporating Privacy Requirements into the System Design Process. The PRIS Conceptual Framework. Internet research, 16:978--1005, 2006.Google ScholarGoogle Scholar
  13. R. Agrawal, P. Bird, T. Grandison, J. Kiernan, S. Logan, and W. Rjaibi. Extending Relational Database Systems to Automatically Enforce Privacy Policies. In ICDE, pages 1013--1022. IEEE Computer Society, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. T. Mielikinen. Privacy Problems with Anonymized Transaction Databases. In 7th Int. Conf. Discovery Science (DS 2004), Lecture Notes in Computer Science.Google ScholarGoogle Scholar
  15. A. Narayanan and V. Shmatikov. Obfuscated Databases and Group Privacy. In 12th ACM conference on Computer and communications security (CCS '05), pages 102--111, New York, NY, USA, 2005. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Legislazione Sanitaria e Sociale, Edizione giuridiche Simone, 2006, ISBN 88-244-7728-3Google ScholarGoogle Scholar
  17. http://www.care2x.org/Google ScholarGoogle Scholar
  18. http://www.php.net/Google ScholarGoogle Scholar
  19. http://www.adodb.sourceforge.net/Google ScholarGoogle Scholar

Index Terms

  1. Introducing privacy in a hospital information system

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SESS '08: Proceedings of the fourth international workshop on Software engineering for secure systems
          May 2008
          72 pages
          ISBN:9781605580425
          DOI:10.1145/1370905
          • Program Chairs:
          • Bart De Win,
          • Seok-Won Lee,
          • Mattia Monga

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 17 May 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate8of11submissions,73%

          Upcoming Conference

          ICSE 2025

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader