Advertisement

Telemedicine pp 125-142 | Cite as

Onconet: A Telematics Application Programme Projects Result

Teletreatment and Teleproctoring of a Home Self-adaptive Visual Field Treatment on PC/ TV Screen
  • Bernd Blobel
  • Peter Pharow
  • Kjeld Engel

Abstract

Resulting from projects launched by the European Commission within the fifth framework such as ISHTAR, TrustHealth, Euromed-ETS or MERDSEC, a security infrastructure has been implemented for enabling trustworthy communication and co-operation between healthcare applications. This security infrastructure consists of Health Professional Cards (HPC) as security tokens and a Trusted Third Party (TTP) providing the Public Key Infrastructure needed for the asymmetric kryptographic algorithms used for security services based on digital signatures such as strong authentication, integrity check, accountability but also for session key exchange. The solutions implemented are solely based on international standards. The generic security solution has been applied to establish a trustworthy healthcare network for seamless care of cancer patients. This shared care application enables the exchange of partial or complete Electronic Healthcare Records (EHCR) in oncology but also queries and statistical analysis about entities etc. The solution is used to support administration of cancer patients, clinical studies, education, research and development, but also quality assurance and optimisation of diagnosis and treatment.

Key words

Health network Security Health Professional Card Trusted Third Party services 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Blobel B, Katsikas SK (1998) Patient data and the Internet - security issues. Chairpersons’ introduction. International Journal of Medical Informatics 49, pp. S5–S8CrossRefGoogle Scholar
  2. The ISHTAR Consortium, http://www.ehto.be/projects/ishtarGoogle Scholar
  3. The TrustHealth Consortium, http://www.ehto.be/projects/trusthealthGoogle Scholar
  4. The EUROMED-ETS Consortium, http://euromed.ece.ntua.grGoogle Scholar
  5. The MEDSEC Consortium, http://www.etho.be/projects/medsecGoogle Scholar
  6. The THIS Consortium, http://www.etho.be/projects/thisGoogle Scholar
  7. 7.
    Blobel B, Pharow P (1997) Security Infrastructure of an Oncological Network Using Health Professional Cards. In: Broek L van den, Sikkel AJ (eds) Health Cards ‘97, Series in Health Technology and Informatics Vol. 49, IOS Press Amsterdam, pp. 323–334Google Scholar
  8. 8.
    CEN TC 251 (1999) prENV 13729: Health Informatics - Secure User Identification - Strong Authentication using Microprocessor Cards (SEC-ID/CARDS)Google Scholar
  9. 9.
    HPC (1999) The German HPC Specification for an electronic doctor’s licence. Version 0.81, February 1999. http://www.hpc-protocol.deGoogle Scholar
  10. The ETS Projects, http://www.cordis.lu/infosec/src/ets.htmGoogle Scholar
  11. 11.
    Katsikas SK, Spinellis DD, Iliadis J, Blobel B (1998) Using Trusted Third Parties for secure telemedical applications over the WWW: The EUROMED-ETS approach. International Journal of Medical Informatics 49, pp. 59–68CrossRefGoogle Scholar
  12. 12.
    Pharow P, Blobel B (1999) Trusted Third Party Services for Internet Security. In: Mastorakis NE (edr) Recent Advances in Signal Processing and Communications, World Scientific and Engineering Society Press, pp 379–385Google Scholar
  13. 13.
    SECUDE (1999) A General Purpose Security Toolkit. Specification of the SECUDE Software, http://www.darmstadt.gmd.de/secudeGoogle Scholar
  14. 14.
    Blobel B, Pharow P, Roger-France F (1999) Security Analysis and Design Based on a General Conceptual Security Model and UML. In: Sloot P, Bubak M, Hoekstra A, Hertzberger B (eds) High Performance Computing and Networking, Lecture Notes in Computer Sciences 1593. Springer, Berlin, Heidelberg, New York, pp 919–930Google Scholar
  15. 15.
    Blobel B, Roger-France F (2000) A Systematic Approach for Secure Health Information Systems. International Journal of Medical Informatics (submitted)Google Scholar
  16. 16.
    Eriksson H-E, Penker M (1998) UML Toolkit. John Wiley & Sons, Inc., New YorkGoogle Scholar
  17. 17.
    Blobel B (2000) Application of the Component Paradigm for Analysis and Design of Advanced Health System Architectures. International Journal of Medical Informatics (submitted).Google Scholar
  18. International Organisation for Standardisation: Information technology, Open Systems Interconnection, Security frameworks for open systems, multiple Parts (1–7).Google Scholar
  19. International Organisation for Standardisation: Information technology, Security techniques, Entity authentication, multiple Parts (1–5).Google Scholar
  20. 20.
    Blobel B, Pharow P, Engel K, Spiegel V, Krohn R (1999) Communication Security in Open Health Care Networks. In: Kokol P, Zupan B, Stare J, Premik M, Engelbrecht R (eds) Medical Informatics Europe ’99, Series in Health Technology and Informatics Vol. 68. IOS Press, Amsterdam, pp 291–296Google Scholar
  21. 21.
    Blobel B, Spiegel V, Krohn R, Pharow P, Engel K (1998) Standard Guide for EDI (HL7) Communication Security, http://www.hl7.orgGoogle Scholar
  22. 22.
    Blobel B, Spiegel V, Krohn R, Pharow P, Engel K (1998) Standard Guide for Implementing EDI (HL7) Communication Security, http://www.hl7.orgGoogle Scholar
  23. 23.
    CEN TC 251 (1999) prENV 13608: Health Informatics - Security for Healthcare Communications,Google Scholar
  24. 24.
    Wenzlaff P, Blobel B, Pharow P (1999) Health Professional Cards: Awareness for Security in Health Care Networks. In: Sicurello F (edr) Health Cards ’99, XASI, Milan, pp 121–125Google Scholar

Copyright information

© Springer Science+Business Media New York 2001

Authors and Affiliations

  • Bernd Blobel
    • 1
  • Peter Pharow
    • 1
  • Kjeld Engel
    • 1
  1. 1.Institute for Biometrics and Medical InformaticsOtto-von-Guericke University MagdeburgMagdeburgGermany

Personalised recommendations