[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1370905.1370907acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Introducing privacy in a hospital information system

Published: 17 May 2008 Publication History

Abstract

Security and privacy issues in healthcare data management play a fundamental role in the widespread adoption of medical information systems. As a consequence, it is very important to define the right means for expressing and managing policies in order to comply with privacy-related standards and regulations.
In this work, we extend an open source hospital information system in order to provide support for expressing and enforcing privacy-related policies, using as a starting point a conceptual model the authors developed in a previous work.

References

[1]
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities of 23 November 1995 No L. 281 p. 31
[2]
Decreto Legislativo n. 196, 30 Giugno 2003, Codice in materia di protezione dei dati personali, Gazzetta Ufficiale n. 174 del 29-7-2003 - Suppl. Ord. n. 123 http://www.hipaa.org
[3]
A. Coen-Porisini, P. Colombo, S. Sicari, A. Trombetta. A Conceptual Model for Privacy Policies. In Proc. of Software Engineering Application (SEA'07), Cambridge, Boston, 2007.
[4]
Q. Ni, A. Trombetta, E. Bertino, and J. Lobo. Privacyaware Role-Based Access Control. In Proc. of ACM Symp. on Access Control Methods And Technologies (SACMAT'07), 2007.
[5]
A. V. Lamsweerde and E. Letier. Handling Obstacles in Goal-Oriented Requirement Engineering. IEEE Trans. Soft. Eng, 26:978--1005, 2000.
[6]
L. Liu, E. Yu, and J. Mylopoulos. Analyzing Security Requirements as Relationships among Strategic Actors. In SREIS'02, e-proceedings, Raleigh, 2002.
[7]
H. Mouratidis, P. Giorgini, and G. Mason. Integrating Security and Systems Engineering towards the Modelling of Secure Information System. In 15th Int. Conf. of Advanced Info. System Engineering (CAiSE'03), vol. 2681 of LNCS, pages 63--78. Springer-Verlang, Berlin, 2003.
[8]
H. Mouratidis, P. Giorgini, and G. A. Manson. An Ontology for Modelling Security: The Tropos Approach. In V. Palade, R. J. Howlett, and L. C. Jain, editors, KES, vol. 2773 of Lecture Notes in Computer Science, pages 1387--1394. Springer, 2003.
[9]
L. Chung. Dealing with Security Requirements during the Development of Information System. In 5th Int. Conf. of Advanced Info.System Engineering (CaiSE'93), Paris (France).
[10]
J. Mylopolulos, L. Chung, and B. Nixon. Representing and Using non Functional Requirements: a Process Oriented Approach. IEEE Trans. Soft. Eng., 18:483--497, 1992.
[11]
A. Anton. Goal-Based Requirements Analysis. In 2nd IEEE Int. Conf. on Requirements Engineering (ICRE'96), pages 136--144, Colorado Springs Co, 1996.
[12]
E. Kavakli, C. Kalloniatis, P. Loucopoulos, and S. Gritzalis. Incorporating Privacy Requirements into the System Design Process. The PRIS Conceptual Framework. Internet research, 16:978--1005, 2006.
[13]
R. Agrawal, P. Bird, T. Grandison, J. Kiernan, S. Logan, and W. Rjaibi. Extending Relational Database Systems to Automatically Enforce Privacy Policies. In ICDE, pages 1013--1022. IEEE Computer Society, 2005.
[14]
T. Mielikinen. Privacy Problems with Anonymized Transaction Databases. In 7th Int. Conf. Discovery Science (DS 2004), Lecture Notes in Computer Science.
[15]
A. Narayanan and V. Shmatikov. Obfuscated Databases and Group Privacy. In 12th ACM conference on Computer and communications security (CCS '05), pages 102--111, New York, NY, USA, 2005. ACM Press.
[16]
Legislazione Sanitaria e Sociale, Edizione giuridiche Simone, 2006, ISBN 88-244-7728-3
[17]
http://www.care2x.org/
[18]
http://www.php.net/
[19]
http://www.adodb.sourceforge.net/

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SESS '08: Proceedings of the fourth international workshop on Software engineering for secure systems
May 2008
72 pages
ISBN:9781605580425
DOI:10.1145/1370905
  • Program Chairs:
  • Bart De Win,
  • Seok-Won Lee,
  • Mattia Monga
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 May 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. conceptual models
  2. hospital information system
  3. privacy policies
  4. software engineering applications

Qualifiers

  • Research-article

Conference

ICSE '08
Sponsor:

Acceptance Rates

Overall Acceptance Rate 8 of 11 submissions, 73%

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)2
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Got Sick and Tracked: Privacy Analysis of Hospital Websites2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW55150.2022.00034(278-286)Online publication date: Jun-2022
  • (2022)Home quarantine patient monitoring in the era of COVID-19 diseaseSmart Health10.1016/j.smhl.2021.10022223(100222)Online publication date: Mar-2022
  • (2022)COPri v.2 — A core ontology for privacy requirementsData & Knowledge Engineering10.1016/j.datak.2021.101888133:COnline publication date: 23-Apr-2022
  • (2022)Adopting a Blockchain-Based Algorithmic Model for Electronic Healthcare Records (EHR) in NigeriaNext Generation of Internet of Things10.1007/978-981-19-1412-6_14(167-175)Online publication date: 27-Sep-2022
  • (2021)An Ontology for Privacy Requirements via a Systematic Literature ReviewJournal on Data Semantics10.1007/s13740-020-00116-59:4(123-149)Online publication date: 7-Jan-2021
  • (2018)Credential purpose-based access control for personal data protectionJournal of Web Engineering10.5555/2871264.287127314:3-4(346-360)Online publication date: 21-Dec-2018
  • (2017)Towards an Ontology for Privacy Requirements via a Systematic Literature ReviewConceptual Modeling10.1007/978-3-319-69904-2_16(193-208)Online publication date: 21-Oct-2017
  • (2011)Privacy in Health Information Systems: A ReviewInformatics Engineering and Information Science10.1007/978-3-642-25483-3_23(285-295)Online publication date: 2011
  • (2009)A Model for Privacy Policy VisualizationProceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 0210.1109/COMPSAC.2009.156(335-340)Online publication date: 20-Jul-2009
  • (2008)The fourth international workshop on software engineering for secure systemsCompanion of the 30th international conference on Software engineering10.1145/1370175.1370251(1069-1070)Online publication date: 10-May-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media