Abstract
In many European countries, elderly citizens constitute a growing part of the population. In some countries like Belgium, it is expected to be as high as one third of the population by 2060. Non-traditional high-tech healthcare solutions are therefore indispensable to cope with the shortage of medical and paramedical staff in the future. In this context, several eHealth projects are launched to modernise the public healthcare system and to address the challenges of declining active workforce in the medical domain. The Walloon Region of Belgium is sponsoring an eHealth Platform for the deployment of internet-based technologies for monitoring of patients and exchange of medical records between hospitals and general practitioners. In this paper, we provide an overview of this eHealth platform and report on-going design activities on managing privacy-sensitive medical data by using a context-aware access control model.
Chapter PDF
References
Kinsella, K., He, W.: An Aging World: 2008 - Int. Population Reports (P95/09-01) (June 2009)
Belgian National Statistical Institute, http://www.statbel.fgov.be
Réseau Santé Wallon, http://www.reseausantewallon.be
Abou El Kalam, A., El Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy 2003), Como, Italia (June 2003)
Directive 95/46/EC of the European Parliament and of the Council of October 24, 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, CELEX number 31995L0046, Official Journal L 281, November 23, pp. 0031 - 0050 (1995)
Lampson, B.W.: Protection. ACM SIGOPS Operating System Review 8(1), 18–24 (1974)
United States Department of Defense, Trusted Computer System Evaluation Criteria (TCSEC), Deaprtment of Defense Standard CSC-STD-00l-83 (August 1983)
Ferraiolo, D., Kuhn, D.R., Hu, V.C.: Assessment of Access Control Systems, Technical Report NISTIR 7316, National Institute of Standards and Technology, US Department of Commerce (2006)
Bell, D.E., La Padula, L.J.: Secure Computer Systems: Mathematical Foundations, MITRE Corporation Technical Report (1973)
Brewer, D.F.C., Nash, M.J.: The Chinese Wall Security Policy. In: IEEE Symposium on Security and Privacy, pp. 206–214 (1989)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)
Cuppens, F., Cuppens-Boulahia, N.: Modeling contextual security policies. International Journal of Information Security (IJIS) 7(4) (August 2008)
Habib, L., Jaume, M., Morisset, C.: Formal definition and comparison of access control models. Journal of Information Assurance and Security (JIAS), Special Issue on Access Control and Protocols 4(4) , 372–381 (2009)
Boustia, N., Mokhtari, A.: Representation and Reasoning on ORBAC: Description Logic with Defaults and Exceptions Approach. In: Proceedings of the 2008 Third international Conference on Availability, Reliability and Security (March 2008)
Benaïssa, N., Méry, D.: Proof-based design patterns, final report of the RIMEL project (ANR-06-SETI-015) (August 2008)
Miege, A.: Definition d’un environnement formel d’expression de politiques de securite. Modele Or-BAC et extensions’ PhD Dissertation in IT Security, Networks and Computer Science Department of ENST Paris (2005)
MotOrBAC: An open source implementation of the OrBAC model, http://motorbac.sourceforge.net
Jackson, D.: Software Abstractions Logic, Language, and Analysis. MIT Press, Cambridge (2006)
van Lamsweerde, A., Darimont, R., Letier, E.: Managing Conflicts in Goal-Driven Requirements Engineering. IEEE Transactions on Software Engineering, Special Issue on Managing Inconsistency in Software Development, 908–926 (November 1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP
About this paper
Cite this paper
Naqvi, S., Dallons, G., Michot, A., Ponsard, C. (2010). Assuring Privacy of Medical Records in an Open Collaborative Environment - A Case Study of Walloon Region’s eHealth Platform. In: Bezzi, M., Duquenoy, P., Fischer-Hübner, S., Hansen, M., Zhang, G. (eds) Privacy and Identity Management for Life. Privacy and Identity 2009. IFIP Advances in Information and Communication Technology, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14282-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-14282-6_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14281-9
Online ISBN: 978-3-642-14282-6
eBook Packages: Computer ScienceComputer Science (R0)