A Sensitive Data Access Model in Support of Learning Health Systems
Autor: | Luc Lavoie, Benoît Fraikin, Thibaud Ecarot, Jean-François Ethier, Mark McGilchrist |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2021 |
Předmět: |
Process management
Computer Networks and Communications Computer science Network security Data security protocols 02 engineering and technology lcsh:QA75.5-76.95 Body of knowledge 03 medical and health sciences 0302 clinical medicine communication system security Health care 0202 electrical engineering electronic engineering information engineering network security 030212 general & internal medicine data security Protocol (object-oriented programming) Vulnerability (computing) business.industry healthcare 020206 networking & telecommunications 3. Good health Human-Computer Interaction Data access lcsh:Electronic computers. Computer science business Knowledge transfer |
Zdroj: | Computers Volume 10 Issue 3 Computers, Vol 10, Iss 25, p 25 (2021) |
ISSN: | 2073-431X |
DOI: | 10.3390/computers10030025 |
Popis: | Given the ever-growing body of knowledge, healthcare improvement hinges more than ever on efficient knowledge transfer to clinicians and patients. Promoted initially by the Institute of Medicine, the Learning Health System (LHS) framework emerged in the early 2000s. It places focus on learning cycles where care delivery is tightly coupled with research activities, which in turn is closely tied to knowledge transfer, ultimately injecting solid improvements into medical practice. Sensitive health data access across multiple organisations is therefore paramount to support LHSs. While the LHS vision is well established, security requirements to support them are not. Health data exchange approaches have been implemented (e.g., HL7 FHIR) or proposed (e.g., blockchain-based methods), but none cover the entire LHS requirement spectrum. To address this, the Sensitive Data Access Model (SDAM) is proposed. Using a representation of agents and processes of data access systems, specific security requirements are presented and the SDAM layer architecture is described, with an emphasis on its mix-network dynamic topology approach. A clinical application benefiting from the model is subsequently presented and an analysis evaluates the security properties and vulnerability mitigation strategies offered by a protocol suite following SDAM and in parallel, by FHIR. |
Databáze: | OpenAIRE |
Externí odkaz: |