کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
517310 1449206 2007 6 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Comparing approaches for advanced e-health security infrastructures
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نرم افزارهای علوم کامپیوتر
پیش نمایش صفحه اول مقاله
Comparing approaches for advanced e-health security infrastructures
چکیده انگلیسی

ObjectivesThe healthcare systems of all developed countries face the challenge for improving quality, efficiency and safety of patients’ care. For meeting this challenge, health is moving from being organisation-centred to process-based care. This process will continue in the future turning health towards person-centred architectures. This system transformation is combined with extended and advanced communication and collaboration supported and enabled by appropriate information and communication technologies (ICT), also called e-health. The resulting solutions have to be trustworthy.MethodsThere is a set of security services needed for realising trustworthy e-health solutions. Those security services must be comprehensively integrated in the e-health application. Furthermore, a set of infrastructure services has to be specified and implemented. For keeping the solutions future-proof, they have to comply with architectural principles and paradigms.ResultsAfter shortly introducing meanwhile internationally acknowledged architectural paradigms for applications, means and infrastructures providing security services, existing, or specified advanced solutions are described and compared. In that context, the Electronic Health Record as e-health core application has been especially considered. Based on published work as well as on explored solutions, the security services needed are summarised and evaluated. The pros and cons of investigated examples are collected and interpreted. In that context, especially the German health telematics framework architecture and security infrastructure and the corresponding implementable solutions on the one hand and the USA Veterans Health Administration approach to security have been carefully considered.ConclusionProcesses and systems are determined by policies, which define and distinguish constraints for communication and collaboration. Therefore, formally modelling policies and performing policy bridging are the main challenges to be met. As result of investigations, recommendations have been derived for establishing the trustworthiness required for any e-health solution at different level from regional to national, European, and even global scale, which are included in the conference summary.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: International Journal of Medical Informatics - Volume 76, Issues 5–6, May–June 2007, Pages 454–459
نویسندگان
,