Journal of Medical Systems

, Volume 36, Issue 5, pp 2731–2741 | Cite as

A Mobile Agent Approach for Secure Integrated Medical Information Systems

  • Chia-Hui Liu
  • Yu-Fang Chung
  • Te-Wei Chiang
  • Tzer-Shyong Chen
  • Sheng-De Wang
Original Paper

Abstract

Different patient-related information in medical organizations is the primary reference for medical personnel diagnosing, treating, and caring patients. With the rapid development of information technology, paper-based medical records have gradually been changed to electronic forms. However, different medical organizations present individual system specifications and data-saving formats so that the medical information of the same patient cannot be exchanged, shared, and securely accessed. In order not to largely change the present medical information systems as well as not to increase abundant costs, Virtual Integrated Medical-information Systems (VIMS) is proposed to assist various hospitals in information exchange. Furthermore, with Mobile Agent, the dispersed medical information can be securely integrated. It presents confidentiality, non-repudiation, source authentication, and integrity in network transmission. Virtual Integrated Medical-information Systems (VIMS) is a virtual electronic integration system combined with Mobile Agent technology. With the features of independence, adaptability, mobility, objectives, and autonomy, Mobile Agent is applied to overcome the problems from heterogeneous systems. With the features, the over-dispersed medical records can be integrated. Moreover, Mobile Agent can ensure the instantaneity and usability of medical records from which doctors can make the most appropriate evaluation and diagnoses. It will avoid the waste of medical resources, such as repetition medication, as well as become the reference of further consultation or health check. Not only can it improve the medical care quality, but it can be provided for medical research.

Keywords

Medical information systems Electronic patient record Mobile agent Secure integrated system Information security 

Notes

Acknowledgment

The work is partially supported by a project from NSC, Taiwan with grant no. NSC99-2221-E-029-023.

References

  1. 1.
    Mildon, J., and Cohen, T., Drivers in the electronic medical records market. Health Manag Technol 22(5):14–16, 2001.Google Scholar
  2. 2.
    Institute Of Medicine, The national academies, “key capabilities of an electronic health record system”. National Academy Press, Washington, 2003.Google Scholar
  3. 3.
    Yamazaki, S. & Y. Satomura, Standard method for describing an electronic patient record template: application of XML to share domain knowledge: Methods of Information in Medicine, pp. 50–55, 2000.Google Scholar
  4. 4.
    Kuhn, K. A., and Giuse, D. A., From hospital information systems to health information systems. Problems, challenges, perspectives. Methods Inf Med 40(4):275–287, 2001.Google Scholar
  5. 5.
    Haux, R., Health information systems—past, present, future. Int J Med Inform 75:268–281, 2006.CrossRefGoogle Scholar
  6. 6.
    S.J. Dwyer III, A personalized view of the history of PACS in the USA. In Medical Imaging 2000: PACS Design and Evaluation: Engineering and Clinical Issues, G. James Blame, Eliot L. Siegel, Editors, Proceedings of SPIE, Vol. 3980, pp. 2–9, 2000.Google Scholar
  7. 7.
    Kahl, K., Irancin, L., and Fuhrmann, M., Automated nursing documentation system provides a favorable return on investment. J Nurs Adm 21(11):44–51, 1991.Google Scholar
  8. 8.
    Vagelatos, A. & Sarivougioukas, J. Lessons Learned from the Introduction of a Laboratory Information Systems in a State Hospital of Athens, Greece. 36th Hawaii International Conference on System Sciences HICSS, USA, 2003.Google Scholar
  9. 9.
    Thomas R. Brown, Handbook of institutional pharmacy practice, 4th Edition, 2006.Google Scholar
  10. 10.
    Karnik, N. M., and Tripathi, A. R., Design issues in mobile-agent programming systems. IEEE Concurrency 6(3):52–61, 1998.CrossRefGoogle Scholar
  11. 11.
    Pham, V. A., and Karmouch, A., Mobile software agents: an overview. IEEE Commun Mag 36(7):26–37, 1998.CrossRefGoogle Scholar
  12. 12.
    Borselius, N., Mobile agent security. Electron Comm Eng J 14(5):211–218, 2002.CrossRefGoogle Scholar
  13. 13.
    Garrigues, C., Robles, S., Borrell, J., and Navarro-Arribas, G., Promoting the development of secure mobile agent applications. J Syst Software (JSS) 83(6):959–971, 2010.CrossRefGoogle Scholar
  14. 14.
    Jennigs, N. R., Sycara, K., and Wooldridge, M., A roadmap of agent research and development. AAMAS 1(1):7–38, 1998.Google Scholar
  15. 15.
    Chung, Y. F., Chen, T. S., and Lai, M. W., Efficient migration access control for mobile agents. Comput Stand Interfac 31(6):1061–1068, 2009.CrossRefGoogle Scholar
  16. 16.
    Lange, D. B., and Oshima, M., Seven good reasons for mobile agents. Commun ACM 42(3):88–89, 1999.CrossRefGoogle Scholar
  17. 17.
    N. R. Jennings. and M. Wooldridge., Applications of Intelligent Agents: Agent Technology Foundations, Applications and Markets, 1998.Google Scholar
  18. 18.
    M. G. Geruti, Mobile Agents in Network-Centric Warfare, International Symposium Autonomous Decentralized Systems, pp.243–246, 2001.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  • Chia-Hui Liu
    • 1
  • Yu-Fang Chung
    • 2
  • Te-Wei Chiang
    • 3
  • Tzer-Shyong Chen
    • 4
  • Sheng-De Wang
    • 1
  1. 1.Electrical Engineering DepartmentNational Taiwan UniversityTaipeiTaiwan
  2. 2.Electrical Engineering DepartmentTunghai UniversityTaichungTaiwan
  3. 3.Urban Planning DepartmentNational Cheng Kung UniversityTainanTaiwan
  4. 4.Information Management DepartmentTunghai UniversityTaichungTaiwan

Personalised recommendations