SECURITY AND DATA NORMALIZATION COLLABORATION sharps.org Discussion by Mark Frisse and Carl Gunter.

Slides:



Advertisements
Similar presentations
| Implications for Health Information Exchange – MetroChicago January 2011.
Advertisements

A Plan for a Sustainable Community Behavioral Health Information Network Western States Health-e Connection Summit & Trade Show September 10, 2013.
Validating EMR Audit Automation Carl A. Gunter University of Illinois Accountable Systems Workshop.
Work / Life Balance A Business Issue or another HR fad? City Forum 19 September 2002 Sue Young, Innova Partnership Limited.
1 HIT Standards Committee Privacy and Security Workgroup: Recommendations Dixie Baker, SAIC Steven Findlay, Consumers Union August 20, 2009.
Enforceable Specification of Privacy Peter Mork Jean Stanford CEM IR&D.
Role Prediction Using Electronic Medical Record System Audits Wen Zhang 1, Carl Gunter 3, David Liebovitz 4, Jian Tian 1, Bradley Malin 1,2 1 Dept. of.
Software Structure CHAPTER 4 The overall structure of the online learning community system : 1.user database 2.content database 3.user/content map 4.user/user.
NHIN Direct Project Communications Work Group Message for State HIE/RECs August 30, 2010.
DICOM and Integrating the Healthcare Enterprise: Five years of cooperation and mutual influence Charles Parisot Chair, NEMA Committee for advancement of.
Illinois Security Lab Using Attribute-Based Access Control to Enable Attribute- Based Messaging Rakesh Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter.
 Firewalls and Application Level Gateways (ALGs)  Usually configured to protect from at least two types of attack ▪ Control sites which local users.
Introduction to Systems Analysis and Design
Security and DICOM Lawrence Tarbox, Ph.D. Chair, DICOM Working Group 14 Siemens Corporate Research.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Overview DM for Business Intelligence.
Use of OCAN in Crisis Intervention Webinar October, 2014.
Modeling and Detecting Anomalous Topic Access Siddharth Gupta 1, Casey Hanson 2, Carl A Gunter 3, Mario Frank 4, David Liebovitz 4, Bradley Malin 6 1,2,3,4.
ICT 1 Towards an Integrated Approach to Access Control to Health Information Presented by: Inger Anne Tøndel SINTEF Co-authors: Per Håkon Meland SINTEF.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
1 Health Information Security and Privacy Collaboration (HISPC) National Conference HISPC Contributions to Massachusetts HIE Privacy and Security Progress:
Sept 13-15, 2004IHE Interoperability Workshop 1 Integrating the Healthcare Enterprise Audit Trail and Node Authentication Robert Horn Agfa Healthcare.
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design.
1 Federal Health IT Ontology Project (HITOP) Group The Vision Toward Testing Ontology Tools in High Priority Health IT Applications October 5, 2005.
September, 2005What IHE Delivers 1 ITI Security Profiles – ATNA, CT IHE Vendors Webinar 2006 IHE IT Infrastructure Education Robert Horn, Agfa Healthcare.
September, 2005What IHE Delivers 1 G. Claeys, Agfa Healthcare Audit Trail and Node Authentication.
Privacy and Security Tiger Team Today’s Discussion: MU3 RFC Comments May 8, 2013.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
Tim Finin University of Maryland, Baltimore County 29 January 2013 Joint work with Anupam Joshi, Laura Zavala and our students SRI Social Media Workshop.
Uncovering Anomalous Usage of Medical Records via Social Network Analysis You Chen, Ph.D. Biomedical Informatics Dept., School of Medicine EECS Dept.,
1 The Software Development Process  Systems analysis  Systems design  Implementation  Testing  Documentation  Evaluation  Maintenance.
Towards semantic interoperability solutions Dipak Kalra.
1 Maryland Health Services Cost Review Commission April 30, 2014 Data and Infrastructure Workgroup Initial Discussion Data Needed for Care Coordination.
AREVA T&D Security Focus Group - 09/14/091 Security Focus Group A Vendor & Customer Collaboration EMS Users Conference September 14, 2009 Rich White AREVA.
An Overview of Intrusion Detection Using Soft Computing Archana Sapkota Palden Lama CS591 Fall 2009.
HIT Policy Committee Privacy & Security Tiger Team Update Deven McGraw, Co-Chair Center for Democracy & Technology Paul Egerman, Co-Chair June 25, 2010.
February 8, 2005IHE Europe Educational Event 1 Integrating the Healthcare Enterprise Basic Security Robert Horn Agfa Healthcare.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Information Systems Engineering. Lecture Outline Information Systems Architecture Information System Architecture components Information Engineering Phases.
Modeling Component-based Software Systems with UML 2.0 George T. Edwards Jaiganesh Balasubramanian Arvind S. Krishna Vanderbilt University Nashville, TN.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
September, 2005What IHE Delivers 1 ITI Security Profiles – ATNA, CT IHE Education Workshop 2007 IHE IT Infrastructure Education John Moehrke GE Healthcare.
MATT REID JULY 28, 2014 CCDA Usability and Interoperability.
TRUST : Team for Research in Ubiquitous Secure Technology National Science Foundation Site Visit February 24-26, 2009 │Berkeley, California Health Infrastructures.
HIT Standards Committee Overview and Progress Report March 17, 2010.
TTCN-3 and ASN.1 interworking Analysis of backward compatibility in ASN.1 Géza Horváth TTCN-3 User Conference – 9 June 2011.
1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Information Exchange Workgroup June 14, IE WG Presentation to HITPC (draft) IE WG Workplan Query exchange recommendations Provider directory.
Privacy and Security Tiger Team Potential Questions for Request for Comment Meaningful Use Stage 3 October 3, 2012.
HIT Policy Committee Meeting Nationwide Health Information Network Governance June 25, 2010 Mary Jo Deering, PhD ONC, Office of Policy and Planning NHIN.
Attribute Release and Scalable Consent \. Part of the original vision for federated identity and necessary for it to succeed Federated identity is less.
Basic Security Cor Loef Philips Medical Systems Co-Chair IHE Radiology Technical Committee.
XDS Security ITI Technical Committee May, XDS Security Use Cases Prevent Indiscriminate attacks (worms, DOS) Normal Patient that accepts XDS participation.
Use of Performance Prediction Techniques for Grid Management Junwei Cao University of Warwick April 2002.
Profiling: What is it? Notes and reflections on profiling and how it could be used in process mining.
Data Mining, Machine Learning, Data Analysis, etc. scikit-learn
Federal Health IT Ontology Project (HITOP) Group
Data Mining 101 with Scikit-Learn
Move this to online module slides 11-56
Electronic Health Record
Electronic Health Record Access Control 7
Enforcement and Policy Challenges in Health Information Privacy
Pam Matthews, FHIMSS Director of Business Information Systems Business Information Systems is focused around administrative and financial information.
Data Mining, Machine Learning, Data Analysis, etc. scikit-learn
Data Mining, Machine Learning, Data Analysis, etc. scikit-learn
HEALTH INFORMATION EXCHANGE AS A PROFESSION PERTEMUAN Ke - 3
18734: Foundations of Privacy
Maryland Health Services Cost Review Commission April 30, 2014
Presentation transcript:

SECURITY AND DATA NORMALIZATION COLLABORATION sharps.org Discussion by Mark Frisse and Carl Gunter

The Emerging Clusters  Four groups of activities have emerged  Policy rules and modules  Audit of EHR access  Encryption and trusted base  Telemedicine  Discussion today: areas of possible overlap with SHARPN  Discussion of Audit Toolkit  Some general discussion questions 3

Introduction  Audit is important for EHRs  Heavy reliance on accountability  Critical trust with patients  Current techniques are too ad hoc and reactive  Need audit that is meaningful  To do this: develop audit techniques that are more portable based on standardized logs  Extensible Medical Open Audit Toolkit (EMOAT)  Carl Gunter, David Liebovitz, Brad Malin, Sanjay Mehrotra together with staff and students 4

Background and Related Work  Standards: DICOM, RFC 3881, IHE ATNA, NHIN Audit Log Requests, HL7 PASS Audit  Analysis  Community-based Anomaly Detection (CADS)  Patient Flow-based Anomaly Detection (PFADS)  Process  Experience-based Access Management  Role-Up Algorithm for role engineering  Reporting support for HHS Rule 45 CFR Part 164 5

Towards Standardized Log Analysis  Mapped attributes are ones that have a standard semantics  Mapping type is a pair consisting of required mapped attributes and optional mapped attributes  Application is compatible if it has the required attributes, may be able to use the others too  Three focus areas so far  The Matrix  Role Hierarchies  Role Mapping 6

Analytic Techniques for Scoring  CADS: Create a social network from joint access to a record. Use k th nearest neighbor to form communities. Look for outliers and their neighbors.  PFADS: Form a graph from observed transitions between record accesses by users grouped in classes. Rare transitions are considered outliers. 8

Analytic Techniques for Role Engineering and Reporting  Role Engineering  Role-up: Train a naïve Bayes classifier on actions of roles over an audit set. Use this to predict roles from actions. Choose a parameter to balance specificity and accuracy.  Reporting  Two views: operations and patient  Scoring to aid operations  Role mapping to aid patients 9

EMOAT Part 1 of 2 10

EMOAT Part 2 of 2 11

CADS Comparison 12

Reporting Application 13

Future Work on EBAM/EMOAT  Continued tuning and testing of the algorithms  Addressing the scalability and flexibility of EMOAT  Extensions to HIE:  Communication between Cerner and Epic systems within NMH,  Illinois controlled substance system  Extending the Matrix: JHU, AthenaHealth, eClinicalWorks, and GE Centricity. Audit worshop?  Coordination with SHARPN? 14

the policy “cloud” Denise Vanderbilt JHU, NWU Helen Policy Synthesis Group Frisse (lead) Denise (co-lead) McCarthy (analyst) VU ISIS Stanford CMU Selected Research Activities Policy prioritization and synthesis common use cases & syntax Laws & Policies RTI Summaries Dartmouth Summaries Developer- readable representation Formal representation backward links U Of IL NWU JHU

Potential discussion  SHARPn & privacy, consent  Granularity (e.g., PCAST).  Roles – access, consent, and encryption  Test beds – who & for what purpose  Thinking through the continuum from “top secret” to “information altruists”  Software tools 16

Further Discussion  How does SHARPn view the general issue of privacy, consent, and the granularity issues (e.g., PCAST).  To what extent are SHARPn investigators working through formalizing roles and other issues?  How do people view the continuum from "top secret" to "research for selective reasons" to "total information altruism." How are people thinking about these issues? What approaches seem most apropos? 17