Healthcare Chains - Enabling Application and Data Privacy Controls for Healthcare Information Systems
Abu Almaati, Shereef
Studies in health technology and informatics 2010; 160(Pt 2): 879-83
Healthcare applications that have access control, disclosure management and or privacy enforcement requirements may implement the respective solutions to these issues at the application level or at the database level or in both. Unfortunately, there are technical and non-technical factors that influence what can be done. In this paper we present a flexible, simple and novel approach to seamlessly imbuing current healthcare applications and their supporting infrastructure with security and privacy functionality, while being cognizant of these factors. This approach is called the Chain method. This paper will highlight the smaller design footprint, the increased ease of implementation and use of the Chain method, while demonstrating that it is as powerful and effective as traditional methods.
Showing items related by title, author, creator and subject.
DATA SMOG: SURVIVING the INFORMATION AGE, by David Shenk; LEGISLATION PRIVACY: TECHNOLOGY, SOCIAL VALUES, and PUBLIC POLICY, by Priscilla M. Regan; NAKED in CYBERSPACE: HOW to FIND PERSONAL INFORMATION ONLINE, by Carol A. Lane; WHO KNOWS: SAFEGUARDING YOUR PRIVACY in a NETWORKED WORLD, by Ann Cavoukian and Dan Tapscott Stevens, Norman (1999-03)
Death and Dying Sourcebook: Basic Consumer Health Information for the Layperson About End-of-Life Care and Related Ethical and Legal Issues, Including Chief Causes of Death, Autopsies, Pain Management for the Terminally Ill, Life Support Systems, Insurance, Euthanasia, Assisted Suicide, Hospice Programs, Living Wills, Funeral Planning, Counseling, Mourning, Organ Donation, and Physician Training; Along With Statistical Data, a Glossary, and Listings of Sources for Further Help And Information Muth, Annemarie S. (1999)