Privacy and security in open and trusted health information systems
Liu, Vicky, Caelli, William J., May , Lauren , & Sahama , Tony (2009) Privacy and security in open and trusted health information systems. In Warren, James R. (Ed.) Proceedings of the Third Australasian Workshop on Health Informatics and Knowledge Management (HIKM 2009), Australian Computer Society, Wellington, New Zealand, pp. 25-30.
The Open and Trusted Health Information Systems (OTHIS) Research Group has formed in response to the health sector’s privacy and security requirements for contemporary Health Information Systems (HIS). Due to recent research developments in trusted computing concepts, it is now both timely and desirable to move electronic HIS towards privacy-aware and security-aware applications. We introduce the OTHIS architecture in this paper. This scheme proposes a feasible and sustainable solution to meeting real-world application security demands using commercial off-the-shelf systems and commodity hardware and software products.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.
|Item Type:||Conference Paper|
|Keywords:||architecture of health information systems, privacy protection, security for health systems, access control, network security in e-health, application security for health applications|
|Subjects:||Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > INFORMATION SYSTEMS (080600)|
|Divisions:||Past > QUT Faculties & Divisions > Faculty of Science and Technology
Past > Institutes > Information Security Institute
|Copyright Owner:||Copyright © 2009 Australian Computer Society, Inc.|
|Copyright Statement:||This paper appeared at the 32nd Australasian Computer Science Conference (ACSC 2009), Wellington, New Zealand. Conferences in Research and Practice in Information Technology (CRPIT), Vol. 97. Jim Warren, Ed. Reproduction for academic, not-for-profit purposes permitted provided this text is included.|
|Deposited On:||23 Oct 2009 04:38|
|Last Modified:||29 Feb 2012 13:56|
Repository Staff Only: item control page