Advertisement

Approaches to security in healthcare multimedia systems

  • S. M. Furnell
  • N. J. Salmons
  • P. W. Sanders
  • C. T. Stockel
  • M. J. Warren
Chapter
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT)

Abstract

This paper examines the need for security in modem healthcare applications and, in particular, the considerations that arise from the use of multimedia. Whilst multimedia is particularly advantageous for information delivery within Healthcare Establishments (HCEs), its adoption introduces some new requirements for information security. The paper presents the outline of a security strategy for future healthcare multimedia systems and networks and also highlights some new opportunities that may be offered by the technologies involved. The discussion is supported by an examination of the approach taken in the POSEIDON system, a prototype multimedia patient records system that is being developed within our research group in conjunction with a local HCE. This describes aspects of both the underlying analysis strategy and the system implementation, with particular reference to how security is being realised.

Keywords

Security healthcare authentication data communication 

References

  1. AIM SEISMED. 1993. “The need for security in health care information systems — a clinical view”, SPI1–02.A08. 02. P.N.Gaunt and F.Roger France, Plymouth Health Authority, United Kingdom.Google Scholar
  2. Arnold, U. and Peter, G. 1993. “A computer-based, distributed multimedia patient record: Use of new technologies for computer-based medical records”, In Proceedings of MIE 93—11th International Congress of the European Federation for Medical Informatics (Jerusalem, Israel, Apr. 18–22 ), 585–590.Google Scholar
  3. Audit Commission. 1994. Opportunity Makes a Thief — An Analysis of Computer Abuse. HMSO Publications Centre, PO Box 276, London, United Kingdom.Google Scholar
  4. Barber, B. 1991. “Towards an information technology security policy for the NHS”, British Journal of Healthcare Computing, British Computer Society.Google Scholar
  5. Ceusters, W.; Bonneu, R.; De Moor, G.; Lapeer, R.; and Thienpont, G. 1993. “The challenge of the nineties: bringing multimedia healthcare records to life”, In Proceedings of MIE 93 — 11th International Congress of the European Federation for Medical Informatics (Jerusalem, Israel, Apr. 18–22 ), 594–599.Google Scholar
  6. Clarke, G. 1996. “Doctors slam NHS security guidelines”, Network Week 1, no. 16: 1.Google Scholar
  7. European Commission — DG XIII. 1994. Telematics Applications Programme (1994–1998), Healthcare (area c, sector 7). (Sep).Google Scholar
  8. Evans, P. 1991. “Conference Report; COMPSEC International 90”, Computers & Security 10, no. 1: 75–77.CrossRefGoogle Scholar
  9. Furnell, S.M. and Sanders, P.W. 1995. “Security Management in the Healthcare Environment”, In Proceedings of MEDINFO ’95 — 8th World Congress on Medical Informatics (Vancouver, Canada, July 23–27 ), 675–578.Google Scholar
  10. INFOSEC Trusted Health Information Systems (THIS). 1994. Trusted Third Party Services: Version 1.0. Swedish Institute for Health Services Development. ( Sept.).Google Scholar
  11. Miller, B. 1994. “Vital signs of identity”, IEEE Spectrum, February 1994: 22–30.Google Scholar
  12. Mukherjee, B.; Heberlein, L.T.; Levitt, K.N. 1994. “Network Intrusion Detection”, IEEE Networks 8, no. 3: 26–41.CrossRefGoogle Scholar
  13. Orozco-Barbosa, L.; Karmouch, A.; Georganas, N.D.; and Goldberg, M. 1992. “A Multimedia Interhospital Communications System for Medical Consultations”, IEEE Journal on Selected Areas in Communications 10, no. 7: 1145–1156.CrossRefGoogle Scholar
  14. Shepherd, S.J.; Sanders, P.W.; and Patel, A. 1990. “A Comprehensive Security System — the Concepts, Agents and Protocols”, Computers & Security 9, no. 7: 631–643.CrossRefGoogle Scholar
  15. Sherman, R.L. 1992. “Biometric Futures”, Computers & Security 11, no. 2: 128–133.CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 1996

Authors and Affiliations

  • S. M. Furnell
    • 1
  • N. J. Salmons
    • 1
  • P. W. Sanders
    • 1
  • C. T. Stockel
    • 1
  • M. J. Warren
    • 2
  1. 1.Network Research Group, Faculty of TechnologyUniversity of PlymouthPlymouthUK
  2. 2.Network Research Group, Plymouth Business SchoolUniversity of PlymouthPlymouthUK

Personalised recommendations