skip to main content
10.1145/1542207.1542228acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Patient-centric authorization framework for sharing electronic health records

Published:03 June 2009Publication History

ABSTRACT

In modern healthcare environments, a fundamental requirement for achieving continuity of care is the seamless access to distributed patient health records in an integrated and unified manner, directly at the point of care. However, Electronic Health Records (EHRs) contain a significant amount of sensitive information, and allowing data to be accessible at many different sources increases concerns related to patient privacy and data theft. Access control solutions must guarantee that only authorized users have access to such critical records for legitimate purposes, and access control policies from distributed EHR sources must be accurately reflected and enforced accordingly in the integrated EHRs.

In this paper, we propose a unified access control scheme that supports patient-centric selective sharing of virtual composite EHRs using different levels of granularity, accommodating data aggregation and various privacy protection requirements. We also articulate and handle the policy anomalies that might occur in the composition of discrete access control policies from multiple data sources.

References

  1. Jaxe XML editor. http://jaxe.sourceforge.net/.Google ScholarGoogle Scholar
  2. J. Barkley and K. Beznosov. Supporting relationships in access control using role based access control. In Proc. of 4th ACM Workshop on Role-Based Access Control, pages 55--65, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Y. Becker and P. Sewell. Cassandra: Flexible trust management, applied to electronic health records. In Proc. of IEEE 17th Computer Security Foundations Workshop, pages 139--154, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Bhatti, K. Moidu, and A. Ghafoor. Policy-based security management for federated healthcare databases (or RHIOs). In Proc. of the international workshop on Healthcare information and knowledge management, pages 41--48, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J.-W. Byun, E. Bertino, and N. Li. Purpose based access control of complex data for privacy protection. In Proc. of 10th ACM symposium on Access control models and technologies (SACMAT), pages 102--110, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ciena. The national health information network creating a new vision. White Paper, Healthcare Information and Management Systems Society (HIMSS) Conference 2008, 2008.Google ScholarGoogle Scholar
  7. E. Coiera and R. Clarke. e-consent: the design and implementation of consumer consent mechanisms in an electronic environment. Journal of the American Medical Informatics Association, 11(2):129--140, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  8. dbMotion. White paper: The critical role of integrated patient information in the delivery of high quality healthcare, January 2008.Google ScholarGoogle Scholar
  9. L. L. Dimitropoulos. Privacy and security solutions for interoperable health information exchange: Interim assessment of variation executive summary. http://www.rti.org/pubs/avas execsumm.pdf, July 2007. RTI Project Number 0209825.000.009.Google ScholarGoogle Scholar
  10. R. H. Dolin, L. Alschuler, S. Boyer, C. Beebe, F. M. Behlen, and P. V. Biron. Hl7 clinical document architecture, release 2.0. ANSI Standard, 2004.Google ScholarGoogle Scholar
  11. D. M. Eyers, J. Bacon, and K. Moody. OASIS role-based access control for electronic health records. In IEEE Proceedings - Software, pages 16--23, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  12. C. Gates and J. Slonim. Owner-controlled information. In Proc. of the 2003 workshop on New security paradigms, pages 103--111, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Grimson, G. Stephens, B. Jung, W. Grimson, D. Berry, and S. Pardon. Sharing health-care records over the internet. IEEE Internet Computing, 5(3):49--58, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. HL7. Hl7 reference information model. http://www.hl7.org/Library/data-model/RIM/modelpage_mem.htm.Google ScholarGoogle Scholar
  15. R. Housley, W. Polk, W. Ford, and D. Solo. Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile. RFC3280, http://rfc.net/rfc3280.html, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. IEEE-USA's Medical Technology Policy Committee Interoperability Working Group, editor. Interoperability for the National Health Information Network (NHIN). IEEE-USA EBOOKS, 2006.Google ScholarGoogle Scholar
  17. Iowa Foundation for Medical Care. HISPC state implementation project summary and impact analysis report for the state of Iowa. http://www.ifmc.org/news/State Impact Report 11-27-07.doc, 2007.Google ScholarGoogle Scholar
  18. J. Jin, G.-J. Ahn, M. J. Covington, and X. Zhang. Toward an access control model for sharing composite electronic health record. In Proc. of 4th International Conference on Collaborative Computing, 2008.Google ScholarGoogle Scholar
  19. C. M. O'Keefe, P. Greenfield, and A. Goodchild. A decentralised approach to electronic consent and health information access control. Journal of Research and Practice in Information Technology, 37(2):161--178, 2005.Google ScholarGoogle Scholar
  20. openEHR Community. openEHR. http://www.openehr.org.Google ScholarGoogle Scholar
  21. M. Peleg, D. Beimel, D. Dori, and Y. Denekamp. Situation-based access control: Privacy management via modeling of patient data access scenarios. Journal of Biomedical Informatics, 41(6):1028--1040, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Pritts and K. Connor. The implementation of e-consent mechanisms in three countries: Canada, england, and the netherlands. SAMHSA report, http://ihcrp.georgetown.edu/pdfs/prittse-consent.pdf, 2007.Google ScholarGoogle Scholar
  23. C. Ruan and V. Varadharajan. An authorization model for e-consent requirement in a health care application. Applied Cryptography and Network Security, LNCS, 2846:191--205, 2003.Google ScholarGoogle Scholar
  24. N. Yang, H. Barringer, and N. Zhang. A purpose-based access control model. In Proc. of 3rd International Symposium on Information Assurance and Security (IAS), pages 143--148, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Patient-centric authorization framework for sharing electronic health records

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SACMAT '09: Proceedings of the 14th ACM symposium on Access control models and technologies
              June 2009
              258 pages
              ISBN:9781605585376
              DOI:10.1145/1542207

              Copyright © 2009 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 3 June 2009

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              SACMAT '09 Paper Acceptance Rate24of75submissions,32%Overall Acceptance Rate177of597submissions,30%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader