Skip header and navigation

Refine By

1 records – page 1 of 1.

Security middleware infrastructure for DICOM images in health information systems.

https://arctichealth.org/en/permalink/ahliterature181791
Source
J Digit Imaging. 2003 Dec;16(4):356-64
Publication Type
Article
Date
Dec-2003
Author
Vijay N V Kallepalli
Sylvanus A Ehikioya
Sergio Camorlinga
Jose A Rueda
Author Affiliation
Department of Computer Science, University of Manitoba, 561 Machray Hall, Winnipeg, Manitoba R3T 2N2, Canada. Vijay@cs.umanitoba.ca
Source
J Digit Imaging. 2003 Dec;16(4):356-64
Date
Dec-2003
Language
English
Publication Type
Article
Keywords
Access to Information - legislation & jurisprudence
Canada
Computer Communication Networks - legislation & jurisprudence
Computer Security - legislation & jurisprudence
Confidentiality - legislation & jurisprudence
Database Management Systems - legislation & jurisprudence
Guideline Adherence - legislation & jurisprudence
Health Insurance Portability and Accountability Act - legislation & jurisprudence
Hospital Information Systems - legislation & jurisprudence
Humans
Medical Records Systems, Computerized - legislation & jurisprudence
Radiology Information Systems - legislation & jurisprudence
Signal Processing, Computer-Assisted
United States
Abstract
In health care, it is mandatory to maintain the privacy and confidentiality of medical data. To achieve this, a fine-grained access control and an access log for accessing medical images are two important aspects that need to be considered in health care systems. Fine-grained access control provides access to medical data only to authorized persons based on priority, location, and content. A log captures each attempt to access medical data. This article describes an overall middleware infrastructure required for secure access to Digital Imaging and Communication in Medicine (DICOM) images, with an emphasis on access control and log maintenance. We introduce a hybrid access control model that combines the properties of two existing models. A trust relationship between hospitals is used to make the hybrid access control model scalable across hospitals. We also discuss events that have to be logged and where the log has to be maintained. A prototype of security middleware infrastructure is implemented.
Notes
Cites: J Digit Imaging. 2002;15 Suppl 1:107-1112105707
PubMed ID
14747934 View in PubMed
Less detail