Patient-centric authorization framework for electronic healthcare services

نویسندگان

  • Jing Jin
  • Gail-Joon Ahn
  • Hongxin Hu
  • Michael J. Covington
  • Xinwen Zhang
چکیده

In modern healthcare environments, a fundamental requirement for achieving continuity of care is the seamless access to distributed patient health records in an integrated and unified manner, directly at the point of care. However, Electronic Health Records (EHRs) contain a significant amount of sensitive information, and allowing data to be accessible at many different sources increases concerns related to patient privacy and data theft. Access control solutions must guarantee that only authorized users have access to such critical records for legitimate purposes, and access control policies from distributed EHR sources must be accurately reflected and enforced accordingly in the integrated EHRs. In this paper, we propose a unified access control scheme that supports patient-centric selective sharing of virtual composite EHRs using different levels of granularity, accommodating data aggregation and privacy protection requirements. We also articulate and address issues and mechanisms on policy anomalies that occur in the composition of discrete access control policies from different data sources. a 2010 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Patient-centric, Attribute-based, Source-verifiable Framework for Health Record Sharing

The storage of health records in electronic format, and the wide-spread sharing of these records among different health care providers, have enormous potential benefits to the U.S. healthcare system. These benefits include both improving the quality of health care delivered to patients and reducing the costs of delivering that care. However, maintaining the security of electronic health record ...

متن کامل

A Context-Aware Authorization Model for Process-Oriented Personal Health Record Systems

Healthcare delivery is a highly complex process involving a broad range of healthcare services, typically performed by a number of geographically distributed and organizationally disparate healthcare providers requiring increased collaboration and coordination of their activities in order to provide shared and integrated care. Under an IT-enabled, patient-centric model, health systems can integ...

متن کامل

An Access Control Framework for Pervasive Mobile Healthcare Systems Utilizing Cloud Services

Mobile in conjunction with cloud computing can fulfil the vision of "Pervasive Healthcare" by enabling authorized healthcare participants to access services and required patient information without locational, time and other restraints. Of particular importance on such healthcare systems that incorporate mobile devices and cloud services is protecting the confidentiality of patient information....

متن کامل

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

Federated, Secure Trust Networks for Distributed Healthcare IT Services

Recent federal regulations mandate the privacy and security of healthcare data at a level never previously contemplated; compliance with those requirements will require a complete rethinking of how data is utilized, stored, and transmitted. To better understand these issues in the context of a modern distributed system, our research group is developing a prototype healthcare IT system and medic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 30  شماره 

صفحات  -

تاریخ انتشار 2011