My Notes
A Review of Security of Electronic Health Records
Khin Than Win. Health Information Management, 34: 13-18, 2005.
Digest of the Discussion Group Sessions
A. Bakker. International Journal of Medical Informatics, 73: 325-331, 2004.
An Introduction to Role-Based Access Control
National Institute of Standards and Technology, 1995.
Role-Based Access Control Models
Ravi S. Sandhu and Edward J. Coyne and Hal L. Feinstein and Charles E. Youman. IEEE Computer, p. 38-47, 1996.
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs
Lillian Rostad and Ole Edsberg. Proceedings of the 22nd Annual Computer Security Applications Conference, 2006.
The findings of this study are surprising and I summarize some of them below:
In the case of emergency access the numbers were too low to analyze. This is probably due to the fact that only a relatively few number of people have this capability. However, actualization is used too frequently to be considered an exception! In contrast to the emergency access, the percentage of people with actualization capability is enormous. The next obvious question is whether this large percentage is justified by the perceived need for this ability. The authors show persuasively that is indeed not the case. Moreover, in analyzing the reasons for why actualization was invoked, the authors found that only 8% of the reasons were self-defined. The use of predefined reasons is both easier for health professionals and provides less specificity; this is not necessarily a good thing.
The authors identified several predefined reasons which they suggest could be folded into normal access control privileges (rather than reserved for the execution of an exception mechanism). They also suggest that the number of individuals with actualization capability should be reduced; the current large numbers are not justified. Adoption of these suggestions would clearly reduce the amount of audit trail data which, in turn, would reduce the burden of checking such voluminous amounts of data.
How to Break Access Control in a Controlled Manner
A. Ferreira, R. Cruz-Correia, L. Antunes, P. Farinha, E. Oliveira-Palhares, D. Chadwick and A. Costa-Pereira. Proceedings of the 19th IEEE Symposium on Computer-Based Medical Systems, p. 847 - 854, 2006.
Authorisation and Access Control for Electronic Health Record Systems
Bernd Blobel. International Journal of Medical Informatics, 73: 251-257, 2004.
e-Consent: The Design and Implementation of Consumer Consent Mechanisms in an Electronic Environment
Enrico Coiera and Roger Clarke. Journal of the American Medical Informatics Association, 11: 129-149, 2004.
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
Moritz Becker and Peter Sewell. Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004.
OASIS Role-Based Access Control for Electronic Health Records
D. Eyers, J. Bacon and K. Moody. Software, IEE Proceedings, 153: 16-23, 2006.
Access and Authorisation in Glocal e-Health Policy Context
Richard Scott, Penny Jennett and Marann Yeo. International Journal of Medical Informatics, 73: 259-266, 2004.
Security Issues Arising in Establishing a Regional Health Information Infrastructure
Roderick Neame and Michael Olson. International Journal of Medical Informatics, 73: 285-290, 2004.
A Cross-Platform Model for Secure Electronic Health Record Communication
Pekka Ruotasalainen. International Journal of Medical Informatics, 73: 291-295, 2004.
Giving Patients Access to Their Medical Records via the Internet: The PCASSO Experience
Daniel Masys, Dixie Baker, Amy Butros and Kevin Cowles. Journal of the American Medical Informatics Association, 9: 181-191, 2002.
Use of a Secure Internet Web Site for Collaborative Medical Research
Wesley Marshall and Robert Haley. Journal of the American Medical Association, 284: 1843-1849, 2000.