IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Improving Security Policy Coverage in Healthcare

Improving Security Policy Coverage in Healthcare
View Sample PDF
Author(s): Rafae Bhatti (Oracle Corp, USA)and Tyrone Grandison (IBM Almaden Research Center, USA)
Copyright: 2011
Pages: 18
Source title: Certification and Security in Health-Related Web Applications: Concepts and Solutions
Source Author(s)/Editor(s): Anargyros Chryssanthou (Hellenic Data Protection Authority, Greece), Ioannis Apostolakis (National School of Public Health, Greece)and Iraklis Varlamis (Harokopio University of Athens, Greece)
DOI: 10.4018/978-1-61692-895-7.ch004

Purchase

View Improving Security Policy Coverage in Healthcare on the publisher's website for pricing and purchasing information.

Abstract

With the adoption of Electronic Medical Records (EMRs), an increasing number of health-related Web applications are now available to consumers, providers and partners. While this transformation offers huge benefits, there are security and privacy concerns integral to the process of electronic healthcare delivery. In this work, the authors first survey the body of evidence to emphasize the design of appropriate security solutions for electronic healthcare applications. The successful solutions will always comply with the prime directive of healthcare - “nothing should interfere with delivery of care” (Grandison and Davis, 2007). The authors then formally present the problem of reconciling security and privacy policies with the actual healthcare workflow, which we refer to as the policy coverage problem. They outline a technical solution to the problem based on the concept of policy refinement, and develop a privacy protection architecture called PRIMA. They also offer guidelines for electronic healthcare applications to ensure adequate policy coverage. The ultimate goal is that electronic healthcare applications should be made secure without compromising usability.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom