UConnBI-BC-1 Security Issues for Bioinformatics Prof. Steven A. Demurjian, Sr. Director, CSE Graduate Program Computer Science & Engineering Department.

Slides:



Advertisements
Similar presentations
Professor Dave Delpy Chief Executive of Engineering and Physical Sciences Research Council Research Councils UK Impact Champion Competition vs. Collaboration:
Advertisements

Patient Public Involvement (PPI) Policy What is PPI? PPI means putting patients and public at the centre of all that we do. It encourages the active participation.
Engineering Medical Information Systems
CSE300-1 Profs. Steven A. Demurjian Q. Jin, J. Nam, Z. Qian and C. Phillips Computer Science & Engineering Department 191 Auditorium Road, Box U-155 The.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Paul Hubbard Portfolio Manager, Border and Transportation Security Information Sharing: Barriers and Solutions Sept 9 Workshop Summary Presented to Armed.
1 GOODS MOVEMENT IN CALIFORNIA. 2 California is facing a significant transportation infrastructure shortfall. California is using innovative approaches.
BMI-1 CSE 5810 Biomedical Informatics Prof. Steven A. Demurjian, Sr. Computer Science & Engineering Department The University of Connecticut 371 Fairfield.
DHS, National Cyber Security Division Overview
National Health Policy Forum William Winkenwerder, Jr., M.D. Assistant Secretary of Defense (Health Affairs) January 28, 2004.
Bridging the Gaps: Public Health and Radiation Emergency Preparedness Mr. James Kish, Director Technological Hazards National Preparedness Directorate.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
OV-1.1 CSE4701 CSE4701 Introduction to Databases Prof. Steven A. Demurjian Computer Science & Engineering Department The University of Connecticut 371.
FE.1 CSE4100 Final Exam Advice and Hints Prof. Steven A. Demurjian, Sr. Computer Science & Engineering Department The University of Connecticut 191 Auditorium.
Institute of Technology University of Minnesota An Introduction Mos Kaveh Associate Dean for Research and Planning Centennial Professor, Electrical & Computer.
Health Policy and Social Enterprise in the UK
Framework for Global Electronic Commerce Communications 411 Relevant Site:
Insurance & Financial Services Cluster Shared Action for Growth Economic Summit & Outlook 2004 January 21, 2004.
Support Groups – Objective 2.02 Agencies that help families in times of crisis. Help children feel more secure. Examples??
 Road Safety the European Union Policy Carla Hess European Commission, Directorate General for Mobility & Transport Road.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Horizon 2020 Secure Societies Security Research and Industry DG Enterprise and Industry 2013.
Academic Computing Daniella Meeker, PhD Director, Clinical Research Informatics SC-CTSI Assistant Professor of Preventive Medicine and Pediatrics.
IntroOH-1 CSE 5810 Wireless Body Sensor Networks (WBSN) in Healthcare Aljoharah A. Algwaiz Computer Science & Engineering Department The University of.
1 Homeland Security Issues and Solutions Prof. Steven A. Demurjian, Sr. Director, CSE Graduate Program Computer Science & Engineering Department The University.
OV-1.1 CSE2102 CSE2102 Intro to Software Engineering Prof. Steven A. Demurjian, Sr. Director, CS&E Graduate Program Computer Science & Engineering Department.
Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
A Paradigm Shift for Sharing Health Information: the Health and Prevention Promotion Initiative (HAPPI) William A. Yasnoff, MD, PhD, FACMI Managing Partner,
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Unit 6 Scenario Question 1 You are the HR Director and your organization is revamping their Safety Policy. Addressing the General Duty Clause write a brief.
Georgia Institute of Technology. Georgia Tech is an innovative intellectual environment with more than 900 full-time instructional faculty and more than.
1 Manatt Health Solutions NYS Office of Health Information Technology Transformation Academy Health State Health Research and Policy Interest Group 2008.
The management of health and biomedical data in Tanzania: Need for a national scientific data policy Leonard E.G. Mboera Directorate of Information Technology,
SECISS-1 CSE333 Prof. Steven A. Demurjian Computer Science & Engineering Department 191 Auditorium Road, Box U-155 The University of Connecticut Storrs,
Health Care Information Systems Research in CERCS Doug Blough.
IntroOH-1 CSE 5810 Challenges for Health Care Prof. Steven A. Demurjian, Sr. Computer Science & Engineering Department The University of Connecticut 371.
Social and Professional Issues in IT Roshan Chitrakar.
Introduction Research indicates benefits to companies who establish effective worker safety and health programs: –Reduction in the extent and severity.
Public Health Data Standards Consortium
Unit 7 Seminar.  According to Sanderson (2009), the problems with the current paper-based health record system have been well documented. The author.
Health Management Information Systems Unit 3 Electronic Health Records Component 6/Unit31 Health IT Workforce Curriculum Version 1.0/Fall 2010.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
(Draft - 8/9/2003) Health Information & Technology Sharing (HITS) Program Office of Information Veterans Health Administration Department of Veterans Affairs.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Enterprise Innovation Institute Growth: Industries Community Policy & Research Services Bringing innovation to local and state government entities Technology-based.
MILITARY HEALTH SYSTEM (MHS) Marco Johnson, Chief, Data Architecture Department of Defense Health Affairs, TRICARE Management Activity, Information Management,
Intrto-1 CSE 5810 Miscellaneous FHIR Slides Prof. Steven A. Demurjian, Sr. Computer Science & Engineering Department The University of Connecticut 371.
 ROAD SAFETY: the European Union Policy European Commission, Directorate General for Mobility & Transport «Road Safety.
1 CDC Health Information Exchange (HIE) Accelerating State-wide Public Health Situational Awareness in New York Through Health Information Exchanges August.
CSE 5810 Biomedical Informatics and Cloud Computing Zhitong Fei Computer Science & Engineering Department The University of Connecticut CSE5810: Introduction.
A Crucial Moment for Scientific Cooperation ESOF-2014 June 25, 2014.
DigitalHC-1 CSE 5810 Digital Healthcare Security Prof. Steven A. Demurjian, Sr. Computer Science & Engineering Department The University of Connecticut.
CSE5810: Intro to Biomedical Informatics
Educause/Internet 2 Computer and Network Security Task Force
5G: What Architecture to Serve Vertical Industries?
Mission: To improve the health of New Haven residents through community engagement, collaborative community-based research, and dissemination of findings.
CSE5810: Intro to Biomedical Informatics
Advanced System Security
Jay Sicklick, Esq. Center for Children’s Advocacy August 6, 2018
Miscellaneous FHIR Slides
CSE255 Final Exam Advice and Hints
Biomedical Informatics
Objectives Describe the purposes of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 Explore how the HITECH Act.
Chapter 4: Security Policies
Presentation transcript:

UConnBI-BC-1 Security Issues for Bioinformatics Prof. Steven A. Demurjian, Sr. Director, CSE Graduate Program Computer Science & Engineering Department The University of Connecticut 191 Auditorium Road, Box U-155 Storrs, CT (860)

UConnBI-BC-2 Medical Informatics  Security Requirements for Medical Records  Privacy vs. Availability  All Aspects of Security for Medical Information  Treatment and Long-Term Care  Insurance Claims and Future Insurability  Nationalization of Medical Information  Critical Aspect of Dynamic Coalition Problem (DCP)  DCP - Security, Resource, and Information Sharing Risks for Alliance of Governmental, Military, Civilian, and International Organizations  Bring Together Divergent Requirements to Support Life-Threatening Situation  Rapid Availability of Patient Data in Emergency Situations

UConnBI-BC-3 Dynamic Coalitions for Medical Informatics Govt. RNs EMTs MDs Transportation Military Medics Local Health Care Pharma. Companies Govt. CDC MDs w/o Borders GOALS: Securely Leverage Information in a Fluid Environment Protect Information While Simultaneously Promoting the Coalition Red Cross Smallpox Outbreak in U.S. State Health Other

UConnBI-BC-4 Public Policy on Security  How do we Protect a Person’s DNA?  Who Owns a Person’s DNA?  Who Can Profit from Person’s DNA?  Can Person’s DNA be Used to Deny Insurance? Employment? Etc.  How do you Define Security Limitations/Access?  Can DNA Repositories be Anonymously Available for Medical Research?  Do Societal Needs Trump Individual Rights?  Can DNA be Made Available Anonymously for Medical Research?  International Repository Might Allow Medical Researchers Access to Large Enough Data Set for Rare Conditions (e.g., Orphan Drug Act)  Individual Rights vs. Medical Advances

UConnBI-BC-5 Security Solutions for Systems/Databases UConn Storrs UConn Health Center Yale Johns Hopkins Pfizer Bayer NIHFDA NSF Info. Sharing - Joint R&D Company and University Partnerships Collaborative Funding Opportunities Retrofit Security Infrastructure Cohesive and Trusted Environment Existing Systems/Databases and New Applications How do you Protect Commercial Interests? Promote Research Advancement? Free Read for Some Data/Limited for Other? Commercialization vs. Intellectual Property? Balancing Cooperation with Propriety

UConnBI-BC-6 What are Key Security Concepts? What are Key Security Concepts?  Assurance  Are the Security Privileges for Each User Adequate (and Limited) to Support their Needs?  What Guarantees are Given by the Security Infra- structure regarding Privileges vs. Information?  Consistency  Are the Defined Security Privileges for Each User Internally Consistent?  Least-Privilege Principle: Just Enough Access  Are the Defined Security Privileges for Related Users Globally Consistent?  Mutual-Exclusion: Read for Some-Write for Others  Role-Based Access Control - User Focused  Mandatory Access Control - Data Focused

UConnBI-BC-7 What are Key Security Concepts?  Authentication  Is the User who S/he Says they are?  Authorization  Does the User have Permission to do what S/he Wants?  Privacy  Is Anyone Intercepting User/Server or User/User Communications?  Enforcement Mechanism  Centralized and Distributed “Code”  Enforces Security Policy at Runtime  For Existing (Retrofit) and New Systems/Clients  Ongoing Research Project in Security  Ongoing Research Project in Security