Literature DB >> 21882003

RBAC-Matrix-based EMR right management system to improve HIPAA compliance.

Hung-Chang Lee1, Shih-Hsin Chang.   

Abstract

Security control of Electronic Medical Record (EMR) is a mechanism used to manage electronic medical records files and protect sensitive medical records document from information leakage. Researches proposed the Role-Based Access Control(RBAC). However, with the increasing scale of medical institutions, the access control behavior is difficult to have a detailed declaration among roles in RBAC. Furthermore, with the stringent specifications such as the U.S. HIPAA and Canada PIPEDA etc., patients are encouraged to have the right in regulating the access control of his EMR. In response to these problems, we propose an EMR digital rights management system, which is a RBAC-based extension to a matrix organization of medical institutions, known as RBAC-Matrix. With the aim of authorizing the EMR among roles in the organization, RBAC-Matrix also allow patients to be involved in defining access rights of his records. RBAC-Matrix authorizes access control declaration among matrix organizations of medical institutions by using XrML file in association with each EMR. It processes XrML rights declaration file-based authorization of behavior in the two-stage design, called master & servant stage, thus makes the associated EMR to be better protected. RBAC-Matrix will also make medical record file and its associated XrML declaration to two different EMRA(EMR Authorization)roles, namely, the medical records Document Creator (DC) and the medical records Document Right Setting (DRS). Access right setting, determined by the DRS, is cosigned by the patient, thus make the declaration of rights and the use of EMR to comply with HIPAA specifications.

Entities:  

Mesh:

Year:  2011        PMID: 21882003     DOI: 10.1007/s10916-011-9776-0

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  3 in total

1.  Personal health record systems and their security protection.

Authors:  Khin Than Win; Willy Susilo; Yi Mu
Journal:  J Med Syst       Date:  2006-08       Impact factor: 4.460

2.  A secure authentication scheme for telecare medicine information systems.

Authors:  Zhen-Yu Wu; Yueh-Chun Lee; Feipei Lai; Hung-Chang Lee; Yufang Chung
Journal:  J Med Syst       Date:  2010-10-27       Impact factor: 4.460

3.  A cryptographic key management solution for HIPAA privacy/security regulations.

Authors:  W-B Lee; C-D Lee
Journal:  IEEE Trans Inf Technol Biomed       Date:  2008-01
  3 in total
  1 in total

Review 1.  Security Techniques for the Electronic Health Records.

Authors:  Clemens Scott Kruse; Brenna Smith; Hannah Vanderlinden; Alexandra Nealand
Journal:  J Med Syst       Date:  2017-07-21       Impact factor: 4.460

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.