You are previewing Certification and Security in Health-Related Web Applications.
O'Reilly logo
Certification and Security in Health-Related Web Applications

Book Description

Health-related Web applications have provided advanced services, such as telemedicine, to patients and doctors. However, with the creation of these applications has come the need to record, process and store medical information by following standard and lawful procedures, to protect medical data from unauthorized access, and to ensure continuity and constant availability of healthcare services. Certification and Security in Health-Related Web Applications: Concepts and Solutions aims to bridge the worlds of healthcare and information technology, increase the security awareness of professionals, students and users and highlight the recent advances in certification and security in health-related Web applications.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  5. Foreword
  6. Foreword
  7. Preface
    1. CERTIFICATION AND SECURITY IN HEALTHCARE
    2. SECURITY RISKS AND COMPLIANCE TO STANDARDS
    3. TARGET AUDIENCE
    4. THE CHAPTERS
    5. CONCLUSION
  8. Acknowledgment
  9. Section 1: Access Control
    1. Chapter 1: Secure Exchange of Electronic Health Records
      1. Abstract
      2. INTRODUCTION
      3. BACKGROUND
      4. PROTECTING PATIENT’S PRIVACY AND CONFIDENTIALITY
      5. CONCLUSIONS
      6. FUTURE RESEARCH DIRECTIONS
    2. Chapter 2: Modeling Access Control in Healthcare Organizations
      1. ABSTRACT
      2. INTRODUCTION
      3. OVERVIEW OF ACCESS CONTROL
      4. MODELING ACCESS CONTROL
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
  10. Section 2: Increasing the Flexibility of Access Control Mechanisms
    1. Chapter 3: A Context-Aware Authorization Model for Process-Oriented Personal Health Record Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MOTIVATING SCENARIO
      5. SYSTEM ARCHITECTURE
      6. ACCESS CONTROL MODEL
      7. Access Control Mechanism
      8. PROTOTYPE IMPLEMENTATION
      9. CONCLUDING REMARKS
      10. FUTURE RESEARCH DIRECTIONS
    2. Chapter 4: Improving Security Policy Coverage in Healthcare
      1. Abstract
      2. INTRODUCTION
      3. BACKGROUND
      4. FORMAL MODEL
      5. USE CASE SCENARIO
      6. FUTURE WORK
      7. CONCLUSION
    3. Chapter 5: Flexibility and Security of Careflow Systems Modeled by Petri Nets
      1. Abstract
      2. INTRODUCTION
      3. BACKGROUND
      4. REQUIREMENTS FOR PROCESS-ORIENTED CLINICAL INFORMATION SYSTEMS
      5. IMPLEMENTING WORKFLOW FLEXIBILITY
      6. ADAPTIVE WORKFLOWS WITH WORKLETS AND EXCEPTION HANDLING
      7. CASE HANDLING WORKFLOWS FOR HEALTHCARE
      8. YAWL – YET ANOTHER WORKFLOW LANGUAGE
      9. CASE STUDY: CAREFLOW PROCESS FOR CUTANEOUS MELANOMA
      10. INTER-ORGANIZATIONAL CAREFLOW SYSTEMS
      11. MULTI-LEVEL SECURITY
      12. MERGING MULTILEVEL SECURITY INTO INTERORGANIZATIONAL WORKFLOWS
      13. CORRECTNESS OF INTERORGANIZATIONAL WORKFLOWS
      14. FUTURE RESEARCH DIRECTIONS
      15. CONCLUSION
  11. Section 3: Certification and Evaluation of Security
    1. Chapter 6: Information Security Standards for Health Information Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND ON STANDARDS AND CERTIFICATIONS
      4. ISO 27000 STANDARDS FOR HEALTHCARE INFORMATION SYSTEMS
      5. ISO/IEC 27799:2008 A PRACTICAL APPROACH
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    2. Chapter 7: Statistical Models for EHR Security in Web Healthcare Information Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND ON ELECTRONIC HEALTH RECORDS
      4. SECURITY IN HEALTHCARE
      5. QUALITY OF HEALTHCARE
      6. SOFTWARE RELIABILITY
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
  12. Section 4: Trust in Healthcare Networks (and Communities)
    1. Chapter 8: Identity Management and Audit Trail Support for Privacy Protection in E-Health Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. Telemedicine Scenario in a Circle of Trust Architecture
      5. PRIVACY PROTECTION
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSIONS
    2. Chapter 9: Certification and Security Issues in Biomedical Grid Portals
      1. Abstract
      2. INTRODUCTION
      3. Background
      4. Security requirements for biomedical grid portals
      5. Basic grid security mechanisms
      6. The GRISSOM PORTAL IN BRIEF
      7. Security Aspects of THE GRISSOM pORTAL
      8. SUMMARY AND CONCLUSIONS
      9. FUTURE WORK DIRECTIONS
      10. APPENDIX A
      11. Appendix B
    3. Chapter 10: Health 2.0 and Medicine 2.0
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FUTURE RESEARCH DIRECTIONS
      5. CONCLUSION
  13. Section 5: Security in Wireless and Mobile Healthcare Applications
    1. Chapter 11: Securing and Prioritizing Health Information in TETRA Networks
      1. Abstract
      2. INTRODUCTION
      3. BACKGROUND
      4. TETRA NETWORKS
      5. EFFICIENT COMMUNICATIONS
      6. SECURITY FUNCTIONS
      7. WIRELESS HEALTH MONITORING
      8. UTILIZATION OF TETRA NETWORK FOR HEALTH INFORMATION TRANSFER
      9. CONCLUSION
  14. Section 6: Legal Aspects of Security in Healthcare
    1. Chapter 12: Online Advertising in Relation to Medicinal Products and Health Related Services
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND - ONLINE ADVERTISING OF MEDICINAL PRODUCTS AND SERVICES
      4. LEGAL IMPLICATIONS FROM THE ELECTRONIC PROMOTION OF MEDICINAL PRODUCTS
      5. CONSUMER PROTECTION ISSUES
      6. CONCLUSION
  15. Section 7: Case Studies: How Healthcare Professionals and Students Perceive Security
    1. Chapter 13: Password Sharing and How to Reduce It
      1. Abstract
      2. INTRODUCTION
      3. BACKGROUND
      4. PASSWORD SHARING
      5. DISCUSSION AND RECOMMENDATIONS
      6. CONCLUSIONS
    2. Chapter 14: Behavioral Security
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. METHODS
      5. RESULTS
      6. FUTURE RESEARCH
      7. CONCLUSIONS
  16. Compilation of References
  17. About the Contributors