Health Care Information Systems Research in CERCS Doug Blough.

Slides:



Advertisements
Similar presentations
HCQ P MEDICARES HEALTH CARE QUALITY IMPROVEMENT PROGRAM QualityNet Exchange Dennis Stricker Director, Information Systems Group Office of Clinical Standards.
Advertisements

Microsoft A Vision for Health. Consumerism/ Choice A Challenging World Public Health Healthcare spend increasing as % of GDP spend Increasing social cost.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
MedVault: Ensuring Security and Privacy for Medical Data Mustaque Ahamad, Douglas Blough, Ling Liu, David Bauer, Apurva Mohan, Daisuke Mashima, Bhuvan.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Database Administration and Security Transparencies 1.
Rationale for Independent Health Record Banks William A. Yasnoff, MD, PhD, FACMI Managing Partner, NHII Advisors William A. Yasnoff, MD, PhD, FACMI Managing.
1 1 Secure Medical Information Exchange (MIX ™ ) System Sead Muftic SETECS Medical Technologies SETECS MIXSystem SETECS ® MIX ™
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
E-Profile-based Security for Critical Transactions in Web Applications Written by: Jean Stephan et al., 2009 Reported by: Renato Casipe, 2/15/2010.
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Georgia Rural Health Information Technology Conference Healthcare Information Systems Requirements to Achieve Meaningful Use Certification December 10,
Chapter 10: Authentication Guide to Computer Network Security.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
Lee Kinsman (soon to be) Consultant, Chamonix IT Consulting
IBM Rhapsody Simulation of Distributed PACS and DIR systems Krupa Kuriakose, MASc Candidate.
Sept 13-15, 2004IHE Interoperability Workshop 1 Integrating the Healthcare Enterprise Overview of IHE IT Infrastructure Patient Synchronized Applications.
Sandy Lum University of Toronto Candidate MHSc in Clinical Engineering The Totally Integrated Electronic Patient Record (EPR)
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
Florida Information Protection Act of 2014 (FIPA).
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 7, 2015 DRAFT1.
OpenPASS Open Privacy, Access and Security Services “Quis custodiet ipsos custodes?”
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
Dependability in FP 6 Brian Randell Pisa Workshop, November 2002.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Computer Science Topical Paper Presentation #15 Zach Sloger The Secure Blackboard Pattern S e c u r e B l a c k b o a r d P a t t e r n – P a.
Martin-1 CSE 5810 CSE 5810 Individual Research Project: Integration of Named Data Networking for Improved Healthcare Data Handling Robert Martin Computer.
Electronic Health Records: Healthcare System’s Common Trends Based on Cloud Computing Group 2: OU Jin FANG Ting
1 Course Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt.
Kuali Days :: Chicago May Kuali Student Presentation on  Person Identity Module  Curriculum Management Module.
DATABASE MANAGEMENT SYSTEMS AND THEIR USES
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topic Recommendations on Trusted Identities for Providers in Cyberspace August 6,
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Single Sign-On
Whose Responsibility is it? Karen Korb TELUS Health Solutions November 24, 2009 Privacy and Confidentiality in the EHR:
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
The Electronic Virtual University in Your Future Council of Scientific Society Presidents Douglas Van Houweling President & CEO -- UCAID.
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Aum Sai Ram Security for Stream Data Modified from slides created by Sujan Pakala.
Clinical Collaboration Platform Overview ST Electronics (Training & Simulation Systems) 8 September 2009 Research Enablers  Consulting  Open Standards.
Enterprise Cybersecurity Strategy
Chapter 19 Manager of Information Systems. Defining Informatics Process of using cognitive skills and computers to manage information.
Nursing Informatics NI.
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Database Management Systems
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
MedMid Working Group Steve Olshansky, Internet2 28 October 2002 Medical Middleware.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
DEVELOPING A PERSONALLY CONTROLLED HEALTH RECORD (PCHR) USING MICROSOFT VISUAL C# SESSION 9 SUMMARY.
F5 APM & Security Assertion Markup Language ‘sam-el’
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Component 6 - Health Management Information Systems Unit 2-1b - Hardware and Software Supporting Health Information Systems.
Information and documentation media systems.
Florida Information Protection Act of 2014 (FIPA)
Peer-to-peer networking
Florida Information Protection Act of 2014 (FIPA)
Company Overview & Strategy
Internet of Things (IoT)
Database 01.
CLINICAL INFORMATION SYSTEM
Distributed medical databases
Collaborative Smart House Environment Computer Science Department University of Cyprus Contact: Christodoulou Eleni.
Peer-to-peer networking
Presentation transcript:

Health Care Information Systems Research in CERCS Doug Blough

MedVault: Security and Privacy for Electronic Medical Records Credential, role, context, data request Authentication Secure Credential Health Care Organization’s IT Perimeter Distributed Data Store (EMR Storage) Role Activ a- tion Auth- oriza- tion Role-based Data Filtering for Privacy Control Meta-policy Database Dynamic Role Manager Role- dependent data view Request/ Response Logging Endpoint Device (User) Secure storage techniques for shared data Endpoint device security Dynamic role-based privacy control Health systems needs and usability issues Research Thrusts Participants: CERCS, GTISC, HSI, Children’s Healthcare

Computing to the Edge and Back: Seamlessly Integrating End Devices into Privacy-Aware Data-Centric Systems NSF Computing Research Infrastructure proposal targeting health care information systems and other applications with similar requirements Participants: most CERCS faculty, some computational sciences and engineering faculty Acquire powerful end devices, compute servers, and storage components to model a typical large health care organization Emulate some components such as patient database, medical instruments producing continuous real-time data flows Research thrusts: –Powerful end systems: personalized services, access/manipulation of rich data sets, new functionalities –Security and privacy: extending privacy to the edges, usable privacy, data cleansing –Dynamic information integration: combining data movement and data manipulation, managed services, real-time data mining

Identity Management Partnership with a number of other universities and research organizations Supported by the Institute for Information Infrastructure Protection (I3P), a DHS- funded institute Focused on secure management of personal information via credentials, specifically targeted at the financial and health care sectors Health care context: moving from closed systems optimized for certain users and with limited patient control, to systems where patients have more access and control but health care quality is not negatively impacted Overall Research Thrust: Credential Lifecycle Management One of our contributions - distributed credential services with: – user control over what personal information to disclose on a given transaction – distribution of personal information across multiple semi-trusted claims verifiers – one-time passwords for multi-factor authentication without special hardware