Abstract
In order to manage performance and provide integrated services, health care data needs to be linked and aggregated across data sources from different organizations. The Internet and secure B2B networks offer the possibility of providing near real-time integration. However, there are three major stumbling blocks. One is to standardize and agree upon a common data model across organizations. The second is to match identities between different locations in order to link and aggregate records. The third is to protect identity and ensure compliance with privacy laws. In this paper, we analyze three main approaches to the problem and use a healthcare scenario to illustrate how each one addresses different aspects of the problem while failing to address others. We then present a systematic framework in which the different approaches can be flexibly combined for a more comprehensive approach to integrate identity management with federated healthcare data models.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
El Emam, K., Jabbouri, S., Sams, S., Drouet, Y., Power, M.: Evaluating common de- identification heuristics for personal health information. Journal of Medical Internet Research 8, e28 (2006)
Elliot, M.: A new approach to the measurement of statistical disclosure risk. International Journal of Risk Management 2(4), 39–48 (2000)
Friedrich, A.: IBM Entity Analytic Solutions, IBM DB2 Anonymous Resolution: Knowledge discovery without knowledge disclosure, IBM DB2 Anonymous Resolution Whitepaper (May 2005), ftp://ftp.software.ibm.com/software/data/pubs/papers/db2anonymousres.pdf (last accessed, January 2009)
Government of Ontario: Personal Health Information Protection Act (2004), http://www.e-laws.gov.on.ca/html/statutes/english/elaws_statutes_04p03_e.htm (accessed, January 2009)
Health Insurance Portability and Accountability Act, United States Congress, United States, http://aspe.hhs.gov/admnsimp/pl104191.htm (last accessed, January 2009)
Hu, J., Peyton, L., Turner, C., Bishay, H.: A model of trusted data collection for knowledge discovery in B2B networks. In: The 2008 International MCETECH Conference on e-Technologies, pp. 60–69. IEEE Press, Washington (2008)
Jonas, J.: Threat and Fraud Intelligence. Las Vegas Style, Security & Privacy Magazine 4, 28–34 (2006)
Koch, M., Möslein, K.M.: Identity Management for Ecommerce and Collaborative Applications. International Journal of Electronic Commerce 9(3), 11–29 (2005)
Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: Proceedings of the twenty-first annual ACM symposium on Theory of computing, Seattle, Washington, United States, pp. 33–43 (1989), ISBN:0-89791-307-8
Ozsu, M.T., Valduriez, P.: Principles of Distributed Database Systems, 2nd edn. Prentice-Hall, Upper Saddle River (1999)
PIPEDA, Government of Canada, Health Information Custodians in the Province of Ontario Exemption Order, http://canadagazette.gc.ca/partII/2005/20051214/html/sor399-e.html (accessed, January 2009)
Stolba, N., Banek, M., Tjoa, A.M.: The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine. In: The First International Conference on Availability, Reliability and Security, pp. 11–22. IEEE Press, Washington (2006)
Swire, P.: Research Report: Application of IBM Anonymous Resolution to the Health Care Sector, http://www.ehcca.com/presentations/cclf3/swire_s5_t4.pdf (last accessed, January 2009)
Wason, T. (ed.): Liberty ID-FF Architecture Overview; version 1.2, Liberty Alliance Project, New Jersey (2003), http://www.projectliberty.org/liberty/resource_center/papers (last accessed, January 2009)
Willenborg, L., de Waal, T.: Elements of statistical disclosure control. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hu, J., Peyton, L. (2009). Integrating Identity Management With Federated Healthcare Data Models. In: Babin, G., Kropf, P., Weiss, M. (eds) E-Technologies: Innovation in an Open World. MCETECH 2009. Lecture Notes in Business Information Processing, vol 26. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01187-0_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-01187-0_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01186-3
Online ISBN: 978-3-642-01187-0
eBook Packages: Computer ScienceComputer Science (R0)