Access control model for sharing composite Electronic Health Records

Jing Jin, Gail-Joon Ahn, Michael J. Covington, Xinwen Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an HER document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities..

Original languageEnglish (US)
Title of host publicationCollaborative Computing
Subtitle of host publicationNetworking, Applications and Worksharing - 4th International Conference, CollaborateCom 2008, Revised Selected Papers
Pages340-354
Number of pages15
DOIs
StatePublished - 2009
Event4th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2008 - Orlando, FL, United States
Duration: Nov 13 2008Nov 16 2008

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume10 LNICST
ISSN (Print)1867-8211

Other

Other4th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2008
Country/TerritoryUnited States
CityOrlando, FL
Period11/13/0811/16/08

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Access control model for sharing composite Electronic Health Records'. Together they form a unique fingerprint.

Cite this