Hostname: page-component-848d4c4894-5nwft Total loading time: 0 Render date: 2024-05-10T12:13:13.601Z Has data issue: false hasContentIssue false

The design and implementation of a novel security model for HealthAgents

Published online by Cambridge University Press:  28 July 2011

Liang Xiao*
Affiliation:
Department of Electronics and Computer Science, University of Southampton, Southampton SO17 1BJ, UK; e-mail: lx@ecs.soton.ac.uk, bh@ecs.soton.ac.uk, dpd@ecs.soton.ac.uk, sd@ecs.soton.ac.uk, phl@ecs.soton.ac.uk
Srinandan Dasmahapatra*
Affiliation:
Department of Electronics and Computer Science, University of Southampton, Southampton SO17 1BJ, UK; e-mail: lx@ecs.soton.ac.uk, bh@ecs.soton.ac.uk, dpd@ecs.soton.ac.uk, sd@ecs.soton.ac.uk, phl@ecs.soton.ac.uk
Paul Lewis*
Affiliation:
Department of Electronics and Computer Science, University of Southampton, Southampton SO17 1BJ, UK; e-mail: lx@ecs.soton.ac.uk, bh@ecs.soton.ac.uk, dpd@ecs.soton.ac.uk, sd@ecs.soton.ac.uk, phl@ecs.soton.ac.uk
Bo Hu*
Affiliation:
Department of Electronics and Computer Science, University of Southampton, Southampton SO17 1BJ, UK; e-mail: lx@ecs.soton.ac.uk, bh@ecs.soton.ac.uk, dpd@ecs.soton.ac.uk, sd@ecs.soton.ac.uk, phl@ecs.soton.ac.uk
Andrew Peet*
Affiliation:
School of Cancer Science, College of Medical and Dental Sciences, University of Birmingham, Birmingham BIJ 2TT, UK; e-mail: acpeet@doctors.org.uk, a.j.gibb@bham.ac.uk
Alex Gibb*
Affiliation:
School of Cancer Science, College of Medical and Dental Sciences, University of Birmingham, Birmingham BIJ 2TT, UK; e-mail: acpeet@doctors.org.uk, a.j.gibb@bham.ac.uk
David Dupplaw*
Affiliation:
Department of Electronics and Computer Science, University of Southampton, Southampton SO17 1BJ, UK; e-mail: lx@ecs.soton.ac.uk, bh@ecs.soton.ac.uk, dpd@ecs.soton.ac.uk, sd@ecs.soton.ac.uk, phl@ecs.soton.ac.uk
Madalina Croitoru*
Affiliation:
LIRMM, 161 rue ADA, F34392 Montpellier Cedex 5, Montpellier, France; e-mail: croitoru@lirmm.fr
Francesc Estanyol*
Affiliation:
MicroArt, Parc Cientific de Barcelona, Baldiri Reixac 4-6, 08028 Barcelona, Spain; e-mail: rroset@microart.eu, mlurgi@microart.eu, jmartinez@microart.eu
Juan Martínez-Miranda*
Affiliation:
MicroArt, Parc Cientific de Barcelona, Baldiri Reixac 4-6, 08028 Barcelona, Spain; e-mail: rroset@microart.eu, mlurgi@microart.eu, jmartinez@microart.eu
Horacio González-Vélez*
Affiliation:
School of Computing and IDEAS Research Institute, Robert Gordon University, St Andrew Street, Aberdeen AB25 1HG, UK; e-mail: h.gonzalez-velez@rgu.ac.uk
Magílluch I Ariet*
Affiliation:
MicroArt, Parc Cientific de Barcelona, Baldiri Reixac 4-6, 08028 Barcelona, Spain; e-mail: rroset@microart.eu, mlurgi@microart.eu, jmartinez@microart.eu

Abstract

In this paper, we analyze the special security requirements for software support in health care and the HealthAgents system in particular. Our security solution consists of a link-anonymized data scheme, a secure data transportation service, a secure data sharing and collection service, and a more advanced access control mechanism. The novel security service architecture, as part of the integrated system architecture, provides a secure health-care infrastructure for HealthAgents and can be easily adapted for other health-care applications.

Type
Articles
Copyright
Copyright © Cambridge University Press 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Anderson, R. 1996. Clinical system security: interim guidelines. British Medical Journal 312, 109112.CrossRefGoogle ScholarPubMed
Anderson, R. 2001. Undermining data privacy in health information. British Medical Journal 322, 442443.CrossRefGoogle ScholarPubMed
Bray, F., Sankila, R., Ferlay, J., Parkin, D. 2002. Estimates of cancer incidence and mortality in Europe in 1995. European Journal of Cancer 38(1), 99166.CrossRefGoogle ScholarPubMed
Calam, D. (n.d.) Information governance—security, confidentiality and patient identifiable information. URL: http://etdevents.connectingforhealth.nhs.uk/eventmanager/uploads/ig.ppt.Google Scholar
CCRA. 2006. Common criteria for information technology security evaluation. URL: http://www.commoncriteriaportal.org/.Google Scholar
Choe, J., Yoo, S. K. 2008. Web-based secure access from multiple patient repositories. International Journal of Medical Informatics 77(4), 242248.CrossRefGoogle ScholarPubMed
Croitoru, M., Xiao, L., Dupplaw, D., Lewis, P. 2008. Expressive security policy rules using layered conceptual graphs. Knowledge-based System 21(3), 209216.CrossRefGoogle Scholar
GMSC/RCGP. 1988. GMSC and RCGP Guidelines for the Extraction and Use of Data from General Practitioner Computer Systems by Organisations External to the Practice. Technical report, GMSC/RCGP Joint Computer Group.Google Scholar
González-Vélez, H., Mier, M., Julià-Sapé, M., Arvanitis, T. N., García-Gómez, J. M., Robles, M., Lewis, P. H., Dasmahapatra, S., Dupplaw, D., Peet, A., Arús, C., Celda, B., Huffel, S., Lluch-Ariet, M. 2009. Healthagents: distributed multi-agent brain tumour diagnosis and prognosis. Applied Intelligence 30(3), 191202.CrossRefGoogle Scholar
Gritzalis, D., Lambrinoudakis, C. 2004. A security architecture for interconnecting health information systems. International Journal of Medical Informatics 73(3), 305309.CrossRefGoogle ScholarPubMed
Hawker, A. 1995. Confidentiality of personal information: a patient survey. Journal of Informatics in Primary Care March, 1619.Google Scholar
IEEE. 1996. IEEE Guide for Software Quality Assurance Planning.Google Scholar
Keese, J., Motzo, L. 2005. Pro-active approach to malware for healthcare information and imaging systems. International Congress Series 1281, 943947.CrossRefGoogle Scholar
Kirn, S., Heine, C., Herrler, R., Krempels, K.-H. 2003. Agent.Hospital—agent-based open framework for clinical applications. IEEE International Workshops on Enabling Technologies, 36. doi/10.1109/ENABL.2003.1231379.Google Scholar
NIST. 2006. Minimum Security Requirements for Federal Information and Information Systems. Technical report, National Institute of Standards and Technology. http://csrc.nist.gov/publications/fips/fips200/FIPS-200-final-march.pdf.Google Scholar
Pfleeger, C., Pfleeger, S. 2002. Security in Computing, 3rd edn. Prentice Hall.Google Scholar
Robertson, D. 2004. A lightweight coordination calculus for agent systems. In Declarative Agent Languages and Technologies Lecture Notes in Computer Science 3476, 183–197. Springer.CrossRefGoogle Scholar
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., Youman, C. E. 1996. Role-based access control models. IEEE Computer 29(2), 3847.CrossRefGoogle Scholar
Smith, S. W. 2003. Humans in the loop: human–computer interaction and security. IEEE Security and Privacy 1(3), 7579.CrossRefGoogle Scholar
Xiao, L., Greer, D. 2007. Towards agent-oriented model-driven architecture. European Journal of Information Systems 16(4), 390406.CrossRefGoogle Scholar
Xiao, L., Greer, D. 2009. Adaptive agent model: software adaptivity using an agent-oriented model-driven architecture. Information and Software Technology 51(1), 109137.CrossRefGoogle Scholar
Xiao, L., Lewis, P., Gibb, A. 2008a. Developing a security protocol for a distributed decision support system in a healthcare environment. In ICSE '08: Proceedings of the 30th International Conference on Software Engineering, ACM, New York, NY, USA, 673682.CrossRefGoogle Scholar
Xiao, L., Lewis, P. H., Dasmahapatra, S. 2008b. Secure interaction models for the HealthAgents system. In ‘SAFECOMP’, Springer, 167–180.Google Scholar
Xiao, L., Peet, A., Lewis, P., Dashmapatra, S., Saez, C., Croitoru, M., Vicente, J., González-Vélez, H., Lluch i Ariet, M. 2007. An adaptive security model for multi-agent systems and application to a clinical trials environment. In Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International, 2, 261–268.Google Scholar
Zhang, L., Ahn, G.-J., Chu, B.-T. 2002. A role-based delegation framework for healthcare information systems. In SACMAT '02: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, ACM, New York, NY, USA, 125134.CrossRefGoogle Scholar