A systematic approach for analysis and design of secure health information systems
- PMID: 11340006
- DOI: 10.1016/s1386-5056(01)00147-2
A systematic approach for analysis and design of secure health information systems
Abstract
A toolset using object-oriented techniques including the nowadays popular unified modelling language (UML) approach has been developed to facilitate the different users' views for security analysis and design of health care information systems. Paradigm and concepts used are based on the component architecture of information systems and on a general layered security model. The toolset was developed in 1996/1997 within the ISHTAR project funded by the European Commission as well as through international standardisation activities. Analysing and systematising real health care scenarios, only six and nine use case types could be found in the health and the security-related view, respectively. By combining these use case types, the analysis and design of any thinkable system architecture can be simplified significantly. Based on generic schemes, the environment needed for both communication and application security can be established by appropriate sets of security services and mechanisms. Because of the importance and the basic character of electronic health care record (EHCR) systems, the understanding of the approach is facilitated by (incomplete) examples for this application.
Similar articles
-
Application of the component paradigm for analysis and design of advanced health system architectures.Int J Med Inform. 2000 Dec;60(3):281-301. doi: 10.1016/s1386-5056(00)00104-0. Int J Med Inform. 2000. PMID: 11137472
-
Advanced and secure architectural EHR approaches.Int J Med Inform. 2006 Mar-Apr;75(3-4):185-90. doi: 10.1016/j.ijmedinf.2005.07.017. Epub 2005 Aug 19. Int J Med Inform. 2006. PMID: 16112891
-
Results of European projects enabling secure regional, national and international health care networks.Stud Health Technol Inform. 1999;64:73-82. Stud Health Technol Inform. 1999. PMID: 10747558
-
Implementing security in a distributed web-based EHCR.Int J Med Inform. 2007 May-Jun;76(5-6):491-6. doi: 10.1016/j.ijmedinf.2006.09.017. Epub 2006 Nov 3. Int J Med Inform. 2007. PMID: 17084662 Review.
-
Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review.J Med Syst. 2019 Jan 15;43(3):42. doi: 10.1007/s10916-019-1158-z. J Med Syst. 2019. PMID: 30648217
Cited by
-
Meeting the security requirements of electronic medical records in the ERA of high-speed computing.J Med Syst. 2015 Jan;39(1):165. doi: 10.1007/s10916-014-0165-3. Epub 2014 Dec 7. J Med Syst. 2015. PMID: 25481568
-
Processing medical data: a systematic review.Arch Public Health. 2013 Oct 9;71(1):27. doi: 10.1186/0778-7367-71-27. Arch Public Health. 2013. PMID: 24107106 Free PMC article.
-
The application of the unified modeling language in object-oriented analysis of healthcare information systems.J Med Syst. 2002 Oct;26(5):383-97. doi: 10.1023/a:1016449031753. J Med Syst. 2002. PMID: 12182204
-
Model-based design and implementation of secure, interoperable EHR systems.AMIA Annu Symp Proc. 2003;2003:96-100. AMIA Annu Symp Proc. 2003. PMID: 14728141 Free PMC article.
-
Biometrics for electronic health records.J Med Syst. 2010 Oct;34(5):975-83. doi: 10.1007/s10916-009-9313-6. Epub 2009 Jun 2. J Med Syst. 2010. PMID: 20703610
Publication types
MeSH terms
LinkOut - more resources
Full Text Sources