skip to main content
10.1145/1866870.1866883acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Using digital rights management for securing data in a medical research environment

Published:04 October 2010Publication History

ABSTRACT

We propose a digital rights management approach for sharing electronic health records in a health research facility and argue advantages of the approach. We also give an outline of the system under development and our implementation of the security features and discuss challenges that we faced and future directions.

References

  1. }}Microsoft Active Directory Rights Management Service. http://technet.microsoft.com/en-ca/windowsserver/dd448611.asp.Google ScholarGoogle Scholar
  2. }}Microsoft Office SharePoint Server. http://sharepoint.microsoft.com.Google ScholarGoogle Scholar
  3. }}eXtensible rights Markup Language version 1.2. http://www.xrml.org/XrML_12.asp, 2001.Google ScholarGoogle Scholar
  4. }}International Standards Organization, Information Technology, Multimedia Framework (MPEG-21), part 4: Intellectual Property Management and Protection Components. ISO/IEC 21000-4, 2006.Google ScholarGoogle Scholar
  5. }}A. Fragopoulos, J. Gialelis, and D. Serpanos. Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components. International Journal of Telemedicine and Applications, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  6. }}B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys, 42(4):1--53, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. }}M. Jafari, R. Safavi-Naini, C. Saunders, and N. P. Sheppard. Securing medical research data with a rights management system. In USENIX HealthSec'10: 1st USENIX Workshop on Health Security and Privacy (to appear), 2010.Google ScholarGoogle Scholar
  8. }}S. Kenny and L. Korba. Applying digital rights management systems to privacy rights management. Computers & Security, 21(7):648 -- 664, 2002.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. }}W. Leister, T. Fretland, and I. Balasingham. Security and Authentication Architecture Using MPEG-21 for Wireless Patient Monitoring Systems. International Journal On Advances in Security, 2(1):16--29, 2009.Google ScholarGoogle Scholar
  10. }}Q. Liu, R. Safavi-Naini, and N. P. Sheppard. Digital rights management for content distribution. In ACSW Frontiers '03, pages 49--58, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. }}Microsoft. Rights Management Services (RMS): Client-to-Server Protocol Specification. http://msdn.microsoft.com/en-us/library/cc243191%28v=PROT.13%29.aspx, 2010.Google ScholarGoogle Scholar
  12. }}M. Petković, S. Katzenbeisser, and K. Kursawe. Rights management technologies: A good choice for securing electronic health records?, In ISSE'07: Proceedings of the International Conference on Information Security Solutions Europe, pages 178--187, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  13. }}N. P. Sheppard and R. Safavi-Naini. Protecting Privacy with the MPEG-21 IPMP Framework. In PET'06: Proceedings of the International Workshop on Privacy Enhancing Technologies, pages 152--171, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. }}N. P. Sheppard, R. Safavi-Naini, and M. Jafari. A digital rights management model for healthcare. In POLICY'09: Proceedings of the IEEE International Workshop on Policies for Distributed Systems and Networks, pages 106--109, London, UK, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. }}N. P. Sheppard, R. Safavi-Naini, and M. Jafari. A secure electronic healthcare record infrastructure in the digital rights management model. Technical report, 2009-939-18, Department of Computer Science, University of Calgary, 2009.Google ScholarGoogle Scholar
  16. }}S. H. Woolf. The meaning of translational research and why it matters. The Journal of American Medical Association, 2008.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Using digital rights management for securing data in a medical research environment

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        DRM '10: Proceedings of the tenth annual ACM workshop on Digital rights management
        October 2010
        94 pages
        ISBN:9781450300919
        DOI:10.1145/1866870

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 October 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader