Putting Identifiers in the Context of eHealth

Introduction of a Model
  • Rieks Joosten
  • Diane Whitehouse
  • Penny Duquenoy
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 262)


eHealth is becoming an increasingly noteworthy domain in terms of public sector exploitation of information and communications technologies. Appro-priately identifying the users of electronic health systems is a major contem-porary challenge. The appropriate identification of eHealth systems’ and ser-vices’ users is one of its core areas of concern. This paper develops a particular problem statement that relates to the notion of identifiers in eHealth, outlines its conceptual background, and defines a set of solutions to the problem outlined. It lists a variety of use cases or examples against which the issues can be tested (these are further explored in a parallel paper [13]), and proposes some possibilities for future work. In particular, the paper de-scribes the results of a 2007 workshop that explored all of these notions. While the paper bases its orientations in a general European framework, the main examples and illustrations used by the authors come from experiences in the Netherlands.


Summer School Conceptual Background European Member State Identifier Problem Information System Environment 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Codd EF (1970) A Relational Model of Data for Large Shared Data Banks CACM, 13 (6), June 1970Google Scholar
  2. 2.
    COM(2004)356 final (2004) e-Health — making healthcare better for European citizens: An action plan for a European e-Health area. Luxembourg, European CommissionGoogle Scholar
  3. 3.
    Directive 95/46/EC (1995) of the European Parliament and the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. See in particular: Whereas 33; article 6.1 (b); article 8.Google Scholar
  4. 4.
    Duquenoy P, George C, Solomonides A (2007) What ELSE? Regulation and compliance in medical imaging and medical informatics. In: Proceedings of MIMI 2007: Medical Imaging and Informatics Conference, Beijing, China, 15–16th August, 2007Google Scholar
  5. 5.
    FIDIS (2007) project deliverable D7.3 Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence. Ac-cessed 5 January 2008Google Scholar
  6. 6.
    HEHIP (2003) A handbook of Ethics for Health Informatics Professionals. London, The British Computer SocietyGoogle Scholar
  7. 7.
    Health (2007) (Interoperability Initiative for a European eHealth Area) project deliverable D3.1b Identification management in eHealth. Accessed 5 January 2008Google Scholar
  8. 8.
    Joosten R, Joosten S (forthcoming) Rules for Identity and Access Control. In: Fischer-Huebner S, Duquenoy P, Zuccato A, Martucci L (eds) Proceedings of the IFIP WG9.2, 9.6/11.7, 11.6/FIDIS Summer School on ‘The Future of Identity in the Information Society’Google Scholar
  9. 9.
    Joosten S, Joosten R (2005) Specifying business processes by means of rules. In: Proceedings European Business Rules Conference. Amsterdam. June 2005Google Scholar
  10. 10.
    Joosten S, Joosten R (2007) Will rule based BPM obliterate Process Models?, to be published.Google Scholar
  11. 11.
    Joosten S, Joosten R, Joosten S (2007a) Ampersand: foutvrije specifkaties voor B&I vraagstukken, Informatie jul/aug (42-50). This article is being translated into English.Google Scholar
  12. 12.
    Joosten S, Joosten R, Joosten S (2007b) Ampersand: Errorfree Specifications for Business-Information Problems, to be published. This article is the translation of the Dutch article cited above.Google Scholar
  13. 13.
    Joosten R, Whitehouse D, Duquenoy P (forthcoming) An identifier model applied to a health context: Results of a workshop (in preparation)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Rieks Joosten
    • 1
  • Diane Whitehouse
    • 2
  • Penny Duquenoy
    • 3
  1. 1.TNOThe Netherlands
  2. 2.The Castlegate ConsultancyUK
  3. 3.Middlesex UniversityUK

Personalised recommendations