Pervasive secure electronic healthcare records management

Petros Belsis, Apostolos Malatras, Stefanos Gritzalis, Christos Skourlas, Ioannis Chalaris

Abstract

Pervasive environments introduce a technological paradigm shift, giving a new impetus to the functionality of applications, overcoming applicability barriers of legacy applications. Electronic healthcare records management can clearly benefit from the new challenges brought by this emerging technology, due to its low cost and high percentage of user adoption. Still, the sensitivity of medical data, poses new requirements in the design of a secure infrastructure based on the ad-hoc networking schema, which underlies pervasive environments. User authorization and controlled access to information is of outmost importance. This paper proposes a management system for electronic healthcare records satisfying the aforementioned security requirements.

References

  1. Perkins, C. E., Ad Hoc Networking, 2001 Addison Wesley Longman Inc.
  2. A. Choudhri, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, “PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments”, Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), Santa Monica, June 2003
  3. Scott R.E., Jennet P., Yeo M. Access and authorization in a Global e-Health Policy context. International Journal of Medical Informatics (2004) 73, 259-266.
  4. Ruotsalainen P. “A cross platform model for secure Electronic health record communication”, International Journal of Medical Informatics, (2004) 73, 291-295
  5. Kokolakis, S., Gritzalis, D. and Katsikas, S. (1998a). Generic security policies for healthcare information systems. Health informatics journal, 4(4), 184-195.
  6. Katsikas, S. and Gritzalis, D. (1996). High level security policy guidelines. In The SEISMED Consortium (eds), Data security for health care. IOS Press, Amsterdam.
  7. M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The keynote trust management system version. Internet RFC 2704, September 1999
  8. Wireless Medicenter. http://www.wirelessmedicenter.com/mc/glance.cfm
  9. David Brazier, Alpha Bravo Charlie Ltd. The m-care project. http://www.mcare.co.uk/tech.html
  10. Organization for the Advancement of Structured Information Standards (OASIS), "XACML Extensible access control markup language specification 2.0", OASIS Standard, (available at http://www.oasis-open.org
  11. The JADE agent development kit. Available at http://jade.tilab.com/
  12. Protégé ontology development kit. http://protege.stanford.edu, (2004)
  13. FIPA Standard Status Specifications. www.fipa.org/repository/standardspecs.html
  14. Elizabeth M. Royer and Chai-Keong Toh. A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Personal Communications, pages 46.55, April 1999.
  15. Belsis P., Gritzalis S., "Distributed autonomous Knowledge Acquisition and Dissemination ontology based framework", Proceedings of “Interop” Workshop on Interoperability, H. Kuehn ed., November 2004, Vienna, Austria, pp. 100-104
  16. R. Friedman, M. Gradinariu and G. Simon, “Locating cache proxies in MANETs”, ACM MobiHoc 2004
  17. P.-J. Wan, K. M. Alzoubi and O. Frieder, “Distributed construction of connected dominating set in wireless ad hoc networks”, IEEE Infocom 2002
  18. Ravi Sandhu, David Ferraiolo, and Richard Kuhn. The NIST model for role-based access control: towards a unified standard. In Proceedings of the Fifth ACM Workshop on RoleBased Access Control (RBAC'00), pages 47-63, 2000.
  19. Damianou, N., N. Dulay, E. Lupu and M. Sloman . Managing Security in Object-based Distributed Systems using Ponder. In Proceedings of the 6th Open European Summer School (Eunice 2000), Enchede, The Netherlands, 13-15 September 2000
Download


Paper Citation


in Harvard Style

Belsis P., Malatras A., Gritzalis S., Skourlas C. and Chalaris I. (2005). Pervasive secure electronic healthcare records management . In Proceedings of the 2nd International Workshop on Ubiquitous Computing - Volume 1: IWUC, (ICEIS 2005) ISBN 972-8865-24-4, pages 101-110. DOI: 10.5220/0002572801010110


in Bibtex Style

@conference{iwuc05,
author={Petros Belsis and Apostolos Malatras and Stefanos Gritzalis and Christos Skourlas and Ioannis Chalaris},
title={Pervasive secure electronic healthcare records management},
booktitle={Proceedings of the 2nd International Workshop on Ubiquitous Computing - Volume 1: IWUC, (ICEIS 2005)},
year={2005},
pages={101-110},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002572801010110},
isbn={972-8865-24-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Workshop on Ubiquitous Computing - Volume 1: IWUC, (ICEIS 2005)
TI - Pervasive secure electronic healthcare records management
SN - 972-8865-24-4
AU - Belsis P.
AU - Malatras A.
AU - Gritzalis S.
AU - Skourlas C.
AU - Chalaris I.
PY - 2005
SP - 101
EP - 110
DO - 10.5220/0002572801010110