Skip to main content
Erschienen in: Journal of Digital Imaging 4/2003

01.12.2003

Security Middleware Infrastructure for DICOM Images in Health Information Systems

verfasst von: Vijay N. V. Kallepalli, M.Sc., Sylvanus A. Ehikioya, Ph.D., Sergio Camorlinga, M.Sc., Jose A. Rueda, Ph.D.

Erschienen in: Journal of Imaging Informatics in Medicine | Ausgabe 4/2003

Einloggen, um Zugang zu erhalten

Abstract

In health care, it is mandatory to maintain the privacy and confidentiality of medical data. To achieve this, a fine-grained access control and an access log for accessing medical images are two important aspects that need to be considered in health care systems. Fine-grained access control provides access to medical data only to authorized persons based on priority, location, and content. A log captures each attempt to access medical data. This article describes an overall middleware infrastructure required for secure access to Digital Imaging and Communication in Medicine (DICOM) images, with an emphasis on access control and log maintenance. We introduce a hybrid access control model that combines the properties of two existing models. A trust relationship between hospitals is used to make the hybrid access control model scalable across hospitals. We also discuss events that have to be logged and where the log has to be maintained. A prototype of security middleware infrastructure is implemented.
Literatur
2.
Zurück zum Zitat Vazquez-Naya, JM, Loureiro, JP, Dorado, J, et al. 2002Necessary security mechanism in a PACS DICOM access system with Web technology.J Digit Imaging. (Special Issue on Inconsistency Management, Society of Computer Applications in Radiology)15107111 Vazquez-Naya, JM, Loureiro, JP, Dorado, J,  et al. 2002Necessary security mechanism in a PACS DICOM access system with Web technology.J Digit Imaging. (Special Issue on Inconsistency Management, Society of Computer Applications in Radiology)15107111
3.
Zurück zum Zitat A Guide to Understanding Discretionary Access Control. National Computer Security Center, NCSC-TG-01, Version-01, Fort George G. Meade, MD, June 1998 A Guide to Understanding Discretionary Access Control. National Computer Security Center, NCSC-TG-01, Version-01, Fort George G. Meade, MD, June 1998
4.
Zurück zum Zitat Lee TMP: Using mandatory integrity to enforce commercial security. Proceedings of IEEE Computer Society Symposium on Security and Privacy (Oakland, CA), May 1998, pp. 140-146 Lee TMP: Using mandatory integrity to enforce commercial security. Proceedings of IEEE Computer Society Symposium on Security and Privacy (Oakland, CA), May 1998, pp. 140-146
5.
Zurück zum Zitat Ferraiolo D, Kuhn R: Role-based access control. proceedings of 15th NIST-NCSC National Computer Security Conference (Baltimore, MD), October 1992 Ferraiolo D, Kuhn R: Role-based access control. proceedings of 15th NIST-NCSC National Computer Security Conference (Baltimore, MD), October 1992
6.
Zurück zum Zitat Chandramouli R: A framework for multiple authorization types in healthcare application systems. Proceedings of 17th Annual Computer Security Applications Conference (New Orleans, LA), December 2001 Chandramouli R: A framework for multiple authorization types in healthcare application systems. Proceedings of 17th Annual Computer Security Applications Conference (New Orleans, LA), December 2001
7.
Zurück zum Zitat Thomas RK: Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. Proceedings of the 2nd ACM Workshop on Role-based Access Control (RBAC’97) (Fairfax, VA), November 1997, pp. 13-19 Thomas RK: Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. Proceedings of the 2nd ACM Workshop on Role-based Access Control (RBAC’97) (Fairfax, VA), November 1997, pp. 13-19
8.
Zurück zum Zitat Zhang L, Ahn GJ, Chu BT: A role-based delegation framework for health care information system. Proceedings of 7th ACM Symposium on Access Control Models and Technologies (SACMAT’02) (Monterey, CA), June 2002 Zhang L, Ahn GJ, Chu BT: A role-based delegation framework for health care information system. Proceedings of 7th ACM Symposium on Access Control Models and Technologies (SACMAT’02) (Monterey, CA), June 2002
10.
Zurück zum Zitat Axelsson S: Intrusion detection systems: a survey and taxonomy. Technical Report 99-15, Department of Computer Engineering, Chalmers University of Technology, SE-41296 Göteborg, Sweden, March 2000 Axelsson S: Intrusion detection systems: a survey and taxonomy. Technical Report 99-15, Department of Computer Engineering, Chalmers University of Technology, SE-41296 Göteborg, Sweden, March 2000
11.
Zurück zum Zitat Digital Imaging and Communications in Medicine2002Standard, Security Profiles.National Electrical Manufactures AssociationRosslyn, VA Digital Imaging and Communications in Medicine2002Standard, Security Profiles.National Electrical Manufactures AssociationRosslyn, VA
Metadaten
Titel
Security Middleware Infrastructure for DICOM Images in Health Information Systems
verfasst von
Vijay N. V. Kallepalli, M.Sc.
Sylvanus A. Ehikioya, Ph.D.
Sergio Camorlinga, M.Sc.
Jose A. Rueda, Ph.D.
Publikationsdatum
01.12.2003
Erschienen in
Journal of Imaging Informatics in Medicine / Ausgabe 4/2003
Print ISSN: 2948-2925
Elektronische ISSN: 2948-2933
DOI
https://doi.org/10.1007/s10278-003-1710-7

Weitere Artikel der Ausgabe 4/2003

Journal of Digital Imaging 4/2003 Zur Ausgabe

OriginalPaper

Author-Title Index

Update Radiologie

Bestellen Sie unseren Fach-Newsletter und bleiben Sie gut informiert.