Skip to main content

Secured Electronic Patient Records Content Exploitation

  • Chapter

Part of the book series: Health Informatics ((HI))

Abstract

The increasing need for medical information applications to handle varied multimedia data through interoperable systems is continually hindered by incompatible limited platforms, with low or non-existent security. Using the workflow of an imaging service, this chapter describes the structure and protection strategy of a secured specialized electronic patient record which allows exchanging of multimedia medical data in a secured manner. An open multimedia standard adapted to patient record requirements has been applied, combined with security tools. Prospective application scenarios are identified, and the main issues of the approach are discussed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Degoulet P, Fieschi M. Informatisation du dossier patient. In: Informatique Médicale. third edition. Paris: Masson; 1998, pp. 119–132.

    Google Scholar 

  2. Beuscart-Zéphir MC, Anceaux F, Crinquette V, Renard JM. Integrating users’ activity modeling in the design and assesment of hospital electronic patient records: the example of anesthesia. Int J Med Inform 2001;64:157–171.

    Article  PubMed  Google Scholar 

  3. Malamateniou F, Vassilacopoulos G. Developing a virtual patient record using XML and Web-based workflow techniques. IntJMed Inform 2003;70:131–139.

    Article  CAS  Google Scholar 

  4. Rassinoux AM, Lovis C, Baud R, Geissbuhler A. XML as standard for communication in a document-based electronic patient record: a 3 years experiment. Int J Med Inform 2003;70:109–115.

    Article  PubMed  Google Scholar 

  5. Ueckert F, Goerz M, Ataian M, Tessmann S, Prokosch H-U. Empowerment of patients and communication with healthcare professionals through an electronic health record. Int J Med Inform 2003;70:99–108.

    Article  PubMed  Google Scholar 

  6. Law MYY. A model of DICOM-based electronic patient record in radiation therapy. Comput Med Imag Graphics 2005;29:125–136.

    Article  Google Scholar 

  7. Brown PJ, Warminglon V. Data quality probes-exploiting and improving the quality of electronic patient record data and patient care, Int J Med Inform 2005;68:91–98.

    Article  Google Scholar 

  8. Van Ginneken AM. The computerized patient record: balancing effort and benefit. Int J Med Info 2002;65:97–119.

    Article  Google Scholar 

  9. Lorence DP, Churchill R. Clinical knowledge management using computerized patient record systems: is the current infrastructure adequate? IEEE Trans Info Technol Biomed 2005;9(2):283–288.

    Article  Google Scholar 

  10. Van de Velde R, Degoulet P. Clinical information systems: a component based approach, first edition. New York: Springer-Verlag; 2003.

    Google Scholar 

  11. International Organization for Standardization and International Electrotechnical Commission. ISO/IEC 15444 1:2000, Information technology—JPEG 2000 image coding system—part I: core coding system.

    Google Scholar 

  12. Christopoulos C, Skodras A, Ebrahimi T. The JPEG 2000 still image coding system: an overview. IEEE Trans Consum Electron 2000;46(4):1103–1127.

    Article  Google Scholar 

  13. Montesinos L, Puentes J. Specialized telepathology electronic patient record based on JPEG 2000. In: Proceedings of4th International IEEE-EM BS Special Topic Conference on Information Technology Applications in Biomedicine, 2003; pp. 110–113.

    Google Scholar 

  14. Dusserre L, Ducrot H, Allaërt: FA. L’information médicale—l’ordinateur et la loi, second edition. Cachan: Editions Médicales Internationales; 1999.

    Google Scholar 

  15. Coatrieux G, Maître H, Sankur B, Rolland Y, Collorec R. Relevance of watermarking in medical imaging. In: Proceedings of 3rd International IEEE-EMBS Special Topic Conference on Information Technology Applications in Biomedicine. 2000; pp. 250–255.

    Google Scholar 

  16. CEN/TC25I. Env 12924—Security categorisation and protection for healthcare information systems. Technical report, CEN 1997.

    Google Scholar 

  17. Schou CD, Frost J, Maconachy WV. Information assurance in biomedical informatics systems. IEEE Mag Eng Med Biol 2004;23(1): 110–118.

    Article  Google Scholar 

  18. Coleman J. Assessing information security risk in healthcare organizations of different scale. Int Congr Ser 2004; 1268:125–130.

    Article  Google Scholar 

  19. El Kalam AA, El Baida R, Balbiani R, Benferhat S, Cuppens F, Deswarte Y, et al. Organization based access control. In: Proceedings of International IEEE Workshop Policies for Distributed Systems and Networks, 2003; pp. 120–131.

    Google Scholar 

  20. Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R. Proposed NIST standard for role-based access control. ACM Trans Info Syst Secur 2001;4(3):224–274.

    Article  Google Scholar 

  21. Prabhakar S, Pankanti S, Jain AK. Biometrie recognition: security and privacy concerns. IEEE Secur Priv 2003; 1(2):33–42.

    Article  Google Scholar 

  22. Dwivedi A, Bali RK, Belsis MA, Naguib RNG, Every P, Nassar NS. Towards a practical healthcare information security model for healthcare institutions. In: Proceedings of 4th International IEEE-EMBS Special Topic Conference on Information Technology Applications in Biomedicine. 2003; pp. 114–117.

    Google Scholar 

  23. Zalenski R. Firewall technologies. IEEE Potentials 2002;21:24–29.

    Article  Google Scholar 

  24. Khanvilkar S, Khokhar A. Virtual private networks: an overview with performance evaluation. IEEE Mag Commun 2004;42(10):146–154.

    Article  Google Scholar 

  25. Schneier B. Applied ciyptography, second edition. Paris: International Thomson Publishing; 1997.

    Google Scholar 

  26. Barni M, Bartolini F. Data hiding for fighting piracy. IEEE Mag Signal Process 2004;21(2):28–39.

    Article  Google Scholar 

  27. Takeda H, Matsumura Y, Kuwata S, Nakano H, Shanmai J, Qiyan Z. et al. An assessment of PKI and networked electronic patient record system: lessons learned from real patient data exchange at the platform of OCHIS. Int J Med Inform 2004;73(3):311–316.

    Article  PubMed  Google Scholar 

  28. Sandhu RS, Samarati P. Access control: principle and practice. IEEE Mag Commun 1994;32(9):40–48.

    Article  Google Scholar 

  29. Blander J, Bergeron B. Clinical management systems: a guide for deployment, first edition. Chicago: Healthcare Information and Management Systems Society; 2004.

    Google Scholar 

  30. Ciccarese P, Caffi E, Quaglini S, Stefanelli M Architectures and tools for innovative health information systems: the guide project. Int. J Med Inform 2005;74:553–562.

    Article  PubMed  Google Scholar 

  31. Muller H, Michoux N, Bandon D, Geissbuhler A. A review of content-based image retrieval systems in medical applications—clinical benefits and future directions. Int J Med Inform 2004;73:1–23.

    Article  PubMed  Google Scholar 

  32. Schabetsberger T, Gross E, Haux R, Lechleitner G, Pellizzari T, Schindelwig K. et al. Approaches towards a regional, shared electronic patient record for healthcare facilities of different healthcare organizations—IT strategy and first results. In: Proceedings of 11th World Congress MEDINFO; 2004, pp. 979–982.

    Google Scholar 

  33. Digital Imaging and Communications in Medicine (DICOM). Supplement 63: JPEG 2000 Transfer Syntaxes. DICOM Standards Committee, Working Group 4 Compression, September 2001.

    Google Scholar 

  34. Miles KA. Diagnostic imaging in undergraduate medical education: an expanding role. Clin Radiol 2005;60:742–745.

    Article  CAS  PubMed  Google Scholar 

  35. Ramnarayan P, Britto J. Pediatric clinical decision support systems. Arch Dis Childhood 2002;87:361–362.

    Article  CAS  Google Scholar 

  36. Rossille D, Laurent JF, Burgun A. Modelling a decision-support system for oncology using rule-based and case-based reasoning methodologies. Int. J Med Inform 2005:74:299–306.

    Article  PubMed  Google Scholar 

  37. Pedersen KV. A framework for a clinical reasoning knowledge warehouse. In: Proceedings of IDEAS Workshop on Medical Information Systems: The Digital Hospital. 2004; pp. 25–34.

    Google Scholar 

  38. Cauvin JM, Le Guillou C, Solaiman B, Robaszkiewicz M, Le Beux P, Roux C. Computer-assisted diagnosis system in digestive endoscopy. IEEE Trans Info Technol Biomed 2003;7(4):256–262.

    Article  Google Scholar 

  39. Bemmel JH, Mulligen EM, Möns B, Wijk M, Kors JA, Lei J. Databases for knowledge discovery: examples from biomedicine and healthcare. Int J Med Inform 2006;75 (3–4):257–267.

    PubMed  Google Scholar 

  40. Cios K.J. editor. Medical data mining and knowledge discovery, first edition. Heidelberg: Physica-Verlag; 2001.

    Google Scholar 

  41. Chen H, Fuller S, Friedman C, Hersh W. Knowledge management, data mining, and text mining in medical informatics. In: Chen H, Fuller S, Friedman C, Hersh W, editors. Medical informatics: knowledge management and data mining in biomedicine. New York: Springer-Verlag; 2005, pp. 3–33.

    Google Scholar 

  42. Tan KC, Yu Q, Heng CM, et al. Evolutionary computing for knowledge discovery in medical diagnosis. Art Intell Med 2003;27:2129–2154.

    Google Scholar 

  43. Kaplan B. Evaluating informatics applications—clinical decision support systems literature review. Int J Med Inform 2001;64(1): 15–37.

    Article  CAS  PubMed  Google Scholar 

  44. Pluye P, Grad RM, Dunikowski LG, Stephenson R Impact of clinical information-retrieval technology on physicians: a literature review of quantitative, qualitative and mixed methods studies. Int J Med Inform 2005;74:745–768.

    Article  PubMed  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Puentes, J., Coatrieux, G., Lecornu, L. (2007). Secured Electronic Patient Records Content Exploitation. In: Bali, R.K., Dwivedi, A.N. (eds) Healthcare Knowledge Management. Health Informatics. Springer, New York, NY. https://doi.org/10.1007/978-0-387-49009-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-49009-0_12

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-33540-7

  • Online ISBN: 978-0-387-49009-0

  • eBook Packages: MedicineMedicine (R0)

Publish with us

Policies and ethics