Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2110363.2110425acmconferencesArticle/Chapter ViewAbstractPublication PagesihiConference Proceedingsconference-collections
research-article

Considering privacy and effectiveness of authorization policies for shared electronic health records

Published: 28 January 2012 Publication History

Abstract

A central building block of data privacy is the individual right of information self-determination, once these information identify individual persons and can therefore be considered as sensitive. Following from that when dealing with shared electronic health records (SEHR), citizens, as the identified individuals of such health records, have to be enabled to decide what medical data can be used in which way by medical professionals. In this context individual preferences of privacy have to be reflected by authorization policies enforced to control access to personal health records. We see two potential challenges, when enabling patient-controlled access control policy authoring: First, an ordinary citizen is considered a non-security expert, thus not necessarily aware of implications of her/his actions of defining access control to protect personal health data. Second, permissions to access medical data are necessary to support the daily routines of medical personnel. The better the health-care information system supports these work procedures the more effective and useful it is. There should be a balance between access restrictions through privacy settings and required access permissions in order to allow the system to be effective. In this paper we present a case study in the context of SEHR in Austria. In this scenario we identify different types of authorization policies to support individuals' privacy. Patient privacy is an important factor in access decision making, but in order to ensure the privacy - effectiveness balance, citizen-authors of policies should be informed about implications of their privacy settings on the underlying information system. To ensure this balance, policies need to be analysed. In this paper we describe a policy analysis method based on generated rules to evaluate the consequences of citizens privacy settings. Analysis results can then be used to inform and support a citizen during the policy authoring process.

References

[1]
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A logical framework for reasoning about access control models. In Proceedings of the sixth ACM symposium on Access control models and technologies, SACMAT '01, 2001.
[2]
B. Blobel. Authorisation and access control for electronic health record systems. International Journal of Medical Informatics, 73(3), 2004.
[3]
A. D. Brucker and H. Petritsch. Extending access control models with break-glass. In Proceeding of the 14th ACM symposium on Access control models and technologies, SACMAT '09, 2009.
[4]
R. Chadha. A Cautionary Note About Policy Conflict Resolution. MILCOM, 0, 2006.
[5]
European Commision. Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data, 1995.
[6]
Integrating the Healthcare Enterprise (IHE). Feasibility Study for implementing the electronic health record (ELGA) in the Austrian health system, 2006.
[7]
Integrating the Healthcare Enterprise (IHE). IT Infrastructure Access Control (White Paper), September 2009.
[8]
C. Karat, J. Karat, C. Brodie, and J. Feng. Evaluating interfaces for privacy policy rule authoring. In CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems, New York, NY, USA, 2006. ACM.
[9]
D. R. Kuhn, E. J. Coyne, and T. R. Weil. Adding Attributes to Role-Based Access Control. IEEE Computer, 43(6), june 2010.
[10]
M. LeMay, O. Fatemieh, and C. A. Gunter. PolicyMorph: interactive policy transformations for a logical attribute-based access control framework. In Proceedings of the 12th ACM symposium on Access control models and technologies, SACMAT '07, 2007.
[11]
E. Lupu and M. Sloman. Conflicts in Policy-based Distributed Systems Management. IEEE Transactions on Software Engineering, 25, 1999.
[12]
F. Massacci, J. Mylopoulos, and N. Zannone. A Privacy Model to Support Minimal Disclosure in Virtual Organizations. In In Proceedings of the W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, 2006.
[13]
J. D. Moffett and M. S. Sloman. Policy conflict analysis in distributed system management, 1993.
[14]
Q. Ni, A. Trombetta, E. Bertino, and J. Lobo. Privacy-aware role based access control. In Proceedings of the 12th ACM symposium on Access control models and technologies, SACMAT '07. ACM, 2007.
[15]
OECD. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, 1980.
[16]
OMG. UML 2.3, Infrastructure Specification, 2010.
[17]
L. Røstad. An Initial Model and a Discussion of Access Control in Patient Controlled Health Records. In Third International Conference on Availability, Reliability and Security: ARES 2008, Washington, DC, USA, 2008. IEEE Computer Society.
[18]
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. Computer, 29, 1996.
[19]
T. Trojer, B. Katt, F. Wozak, and T. Schabetsberger. An Authoring Framework for Security Policies: A Use-case within the Healthcare Domain. In eHealth 2010, 2010.
[20]
L. Wang, D. Wijesekera, and S. Jajodia. A logic-based framework for attribute based access control. In In 2nd ACM Workshop on Formal Methods in Security Engineering (FMSE 2004. ACM Press, 2004.
[21]
A. Westin. Privacy and Freedom. Atheneum, New York, USA, 1967.

Cited By

View all
  • (2022)Protecting Personal Health Data through Privacy AwarenessProceedings of the ACM on Human-Computer Interaction10.1145/34928306:GROUP(1-22)Online publication date: 14-Jan-2022
  • (2018)Large displays and tabletsProceedings of the 10th Nordic Conference on Human-Computer Interaction10.1145/3240167.3240192(664-675)Online publication date: 29-Sep-2018
  • (2016)A Database as a Service for the Healthcare System to Store Physiological Signal DataPLOS ONE10.1371/journal.pone.016893511:12(e0168935)Online publication date: 29-Dec-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IHI '12: Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
January 2012
914 pages
ISBN:9781450307819
DOI:10.1145/2110363
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 January 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. electronic health record
  3. policy analysis

Qualifiers

  • Research-article

Conference

IHI '12
Sponsor:
IHI '12: ACM International Health Informatics Symposium
January 28 - 30, 2012
Florida, Miami, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Protecting Personal Health Data through Privacy AwarenessProceedings of the ACM on Human-Computer Interaction10.1145/34928306:GROUP(1-22)Online publication date: 14-Jan-2022
  • (2018)Large displays and tabletsProceedings of the 10th Nordic Conference on Human-Computer Interaction10.1145/3240167.3240192(664-675)Online publication date: 29-Sep-2018
  • (2016)A Database as a Service for the Healthcare System to Store Physiological Signal DataPLOS ONE10.1371/journal.pone.016893511:12(e0168935)Online publication date: 29-Dec-2016
  • (2016)Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutionsInternational Journal of Information Management: The Journal for Information Professionals10.1016/j.ijinfomgt.2016.07.00636:6(1161-1173)Online publication date: 1-Dec-2016
  • (2014)TRAAC: Trust and risk aware access control2014 Twelfth Annual International Conference on Privacy, Security and Trust10.1109/PST.2014.6890962(371-378)Online publication date: Jul-2014
  • (2014)Using a database as a service for providing electronic health recordsIEEE-EMBS International Conference on Biomedical and Health Informatics (BHI)10.1109/BHI.2014.6864291(9-12)Online publication date: Jun-2014
  • (2014)Ontology-Driven Authorization Policies on Personal Health Records for Sustainable Citizen-Centered HealthcareConcepts and Trends in Healthcare Information Systems10.1007/978-3-319-06844-2_4(43-60)Online publication date: 26-Sep-2014
  • (2012)Managing Privacy and Effectiveness of Patient-Administered Authorization PoliciesInternational Journal of Computational Models and Algorithms in Medicine10.4018/jcmam.20120401033:2(43-62)Online publication date: 1-Apr-2012
  • (undefined)Scenario-Based Templates Supporting Usable Privacy Policy AuthoringSSRN Electronic Journal10.2139/ssrn.2458003

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media