Automating Authorization Propagation Process in Personal Health Records
نویسندگان
چکیده
The use of Optical Biopsies-OB (in the present case Confocal endomicroscopy-CEM) is limited due to difficulties to interpret images. The OB-CEM are taken by endoscopists, not trained in microscopic morphology which is the domain of the surgical pathology. To gain diagnostic confidence the endoscopists could consult the images to a pathologist or could use the technique proposed in the paper. That is, to search for similar images on Internet to compare the diagnosis. The present paper is a positioning paper of how to build a CEM-image metadata to be used by the multimedia standards ISO-15938-12:2008 and ISO-24800-3 in order to search on line using a “query by image”. Metadata semantics based on Kudo colorectal crypt architecture was used for annotation or automatic image extraction. The training set was composed of 25 OB-CEM chromo-colonoscopy images taken with a FICE (Fujinon Intelligent Chromoendoscopy). Those parameters were, whenever possible, automatically extracted from the image and included in the metadata for image mining. Future developments will annotate histological images is such a way that the query could also retrieve the histological image.
منابع مشابه
A Context-Aware Authorization Model for Process-Oriented Personal Health Record Systems
Healthcare delivery is a highly complex process involving a broad range of healthcare services, typically performed by a number of geographically distributed and organizationally disparate healthcare providers requiring increased collaboration and coordination of their activities in order to provide shared and integrated care. Under an IT-enabled, patient-centric model, health systems can integ...
متن کاملThe Process of Policy Authoring of Patient-Controlled Privacy Preferences
Discussions about appropriate security controls to protect medical records led to the understanding that the patient her-/himself plays a crucial role in networked electronic health-care. Patients have individual privacy concerns and may want to execute their personal right of self-determination on access and usage of their medical records. The ability for patients to have control over their pe...
متن کاملAn Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation
Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Modality conflict is one of the main issues in policy evaluation. Existing modality conflict detection approaches do not consider complex condition attributes such as spatial and temporal constraints. An effective authorization propagation rule is n...
متن کاملAccess Control Policy Administration supporting User-defined Privacy Preferences A Use-case in the context of Patient-centric Health-care
The protection of medical records is understood to be an issue related to privacy and therefore closely bound to the patient her/himself, playing a crucial role in networked electronic health-care. Awarding users to have control over personal data stored and processed by information systems is important as it allows a user to communicate individual privacy concerns. Still, users self-maintainin...
متن کاملCiphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes
In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user secret key is associated with a set of attributes, and the ciphertext is associated with an access structure or decryption policy over attributes. The user can decrypt the ciphertext if and only if the attribute set of his secret key satisfies the decryption policy specified in the ciphertext. Several CP-ABE schemes have been prop...
متن کامل