SlideShare ist ein Scribd-Unternehmen logo
1 von 43
Berlin October 9 2002 Timaru Eye Clinic, New Zealand. CDA Access Control The Immunological Metaphor Mike Mair and Stephen Chu  October 9, 2002, Berlin
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
In the immune system ,[object Object]
The ‘effector’ end of the IGG molecule  The recognition ends of the IGG
Immunoglobulin Structure ,[object Object]
IGM, the IGG pentameter
The universal role for immunoglobulin ,[object Object],[object Object],[object Object],[object Object],[object Object]
Suggestions for inclusion in the Header : searchable meta-data to facilitate its use in access control. Will the rules for a document ontology do this?  Document-class  service+ condition,  clinical category, practice setting,  +role Include ‘role for access’ , similar to the CEN ‘distribution rule’ part 3 of the 4 part standard ENV 13606
[object Object],[object Object],[object Object],[object Object],The ISOTC/215 Access Proposal
 
 
“ At the presentation to WG1 meeting in March 2001, Seoul, Korea, I mentioned that the CDA might function as the attestable unit, and the access lock might derive from a ‘detachable header’ for the CDA. “
Detachable Header
The Health Event Summary (HES) ,[object Object],[object Object],[object Object]
The Clinical Document Architecture as HES  (Chu et al 2002) ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Is Access Control ‘out of scope’ for the CDA?
The Proposal from Finland Itala and Virtahen  ‘Seamless care and the CDA’ ,[object Object]
 
checkDocInfo( )   - object operation/method defined for the CDA Header/Access Object to get the meta-data information about the document as part of the matching function required to determine whether there is a match between the document requestor wants and the CDA header stored   checkServeTarget( )   - also object operation/method defined for the CDA Header/Access Object to get the patient identified by the requestor for the CDA document required is the target patient for whom the CDA header (in the regional server list) was created for getOriginatingOrgNetID( )  is an operation/method defined for the the CDA Header/Access Object stored on the regional server. This operation will interrogate the CDA Header List stored in the regional server which should hold the Network ID/address of where the original attestable CDA data/documents are held - the Provider Organisation that created and stores the data/document, or the regional server itself.
Access process proposal ,[object Object],[object Object],[object Object],[object Object]
matchReq&DataAccessRole( )   - an object operation defined for the 'Access Lock' object to detemine whether the 'Role for Access' supplied by the 'Request Object' is of the legal role for access the data for which the 'Role for Access' attribute has been defined.
Access Process Proposal ,[object Object],[object Object],[object Object]
We suggest four stages for a universal access control mechanism to accompany the CDA as the universal ‘attestable unit’ of healthcare.
Stage One ,[object Object]
Stage Two ,[object Object],[object Object]
 
Stage Three ,[object Object],[object Object]
Regional Server data store List of CDA Headers (or Access Objects) Provider Server data store Match found Locates CDA document source Attestable Unit Document  information Encounter data Service actors Service targets Clinical digest Attestable Unit Document  information Encounter data Service actors Service targets Clinical digest Which may be on its own data store
Regional Server data store List of CDA Headers (or Access Objects) Provider Server data store Locates CDA document source Encrpytion key transfer Attestable Unit Document  information Encounter data Service actors Service targets Clinical digest Access approved
Stage Four ,[object Object]
SSL SOAP security SOAP Envelope Digital signature Public key certificate SOAP encryption Role-base access control SSL SSL Regional (SOAP) Server Data store Regional (SOAP) Server Data store Requestor Data store Provider (originating Organization) Secure Socket  Layer (SSL) Security Cleint/Server authentication Supporting SOAP encryption 2  CDA   request in SOAP envelope 3  Route request to  neigbour if necessary 3  Get complete CDA from  Provider if request and access role matched 1  Request to neighbour server CDA Document in SOAP Envelop SOAP Security
If the regional server that received the request for the CDA document cannot find a match on its CDA header list, it will pass on the request to a neighboring server, which will pass onto the next ...... until a match is found and the procedure of the previous paragraph will be performed, or it returns a ‘no find’ result. NB: This model assumes continuous ‘on line’ availability of data from providers.
CDA Confidentiality Attributes ,[object Object]
 
Role Words ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Roles as self defining ‘autopoietic’ sets
Cross border role mapping ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Provider  Regional Network  Requestor Retrieving CDAs from the network…….they might cling to the search sticks, like termites!
The ‘end dream….’ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank you for your attention Many thanks to the organizers of this wonderful event

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET Journal
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionIOSR Journals
 
Practice Fusion & MongoDB: Transitioning a 4 TB Audit Log from SQL Server to ...
Practice Fusion & MongoDB: Transitioning a 4 TB Audit Log from SQL Server to ...Practice Fusion & MongoDB: Transitioning a 4 TB Audit Log from SQL Server to ...
Practice Fusion & MongoDB: Transitioning a 4 TB Audit Log from SQL Server to ...MongoDB
 
Open Cybersecurity Alliance Briefing at RSAC 2020
Open Cybersecurity Alliance Briefing at RSAC 2020Open Cybersecurity Alliance Briefing at RSAC 2020
Open Cybersecurity Alliance Briefing at RSAC 2020Carol Geyer
 
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET Journal
 
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search IRJET Journal
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data MiningVrushali Malvadkar
 
Knowledge Discovery using an Integrated Semantic Web
Knowledge Discovery using an Integrated Semantic WebKnowledge Discovery using an Integrated Semantic Web
Knowledge Discovery using an Integrated Semantic WebMichel Dumontier
 
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...IRJET Journal
 
IoT/Big Data Patent Claim Drafting Strategy under Post-Alice 101 Eligibility ...
IoT/Big Data Patent Claim Drafting Strategy under Post-Alice 101 Eligibility ...IoT/Big Data Patent Claim Drafting Strategy under Post-Alice 101 Eligibility ...
IoT/Big Data Patent Claim Drafting Strategy under Post-Alice 101 Eligibility ...Alex G. Lee, Ph.D. Esq. CLP
 
Neo4j for Discovering Drugs and Biomarkers
Neo4j for Discovering Drugs and BiomarkersNeo4j for Discovering Drugs and Biomarkers
Neo4j for Discovering Drugs and BiomarkersNeo4j
 
Data security in genomics: A review of Australian privacy requirements and th...
Data security in genomics: A review of Australian privacy requirements and th...Data security in genomics: A review of Australian privacy requirements and th...
Data security in genomics: A review of Australian privacy requirements and th...Arran Schlosberg
 
HealthBlock: A Secured Healthcare Data using Blockchain
HealthBlock: A Secured Healthcare Data using BlockchainHealthBlock: A Secured Healthcare Data using Blockchain
HealthBlock: A Secured Healthcare Data using BlockchainMd. Mahfujur Rahman
 
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachPrivacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachNarendra Dhadhal
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions   2014 ieee java project - decentralized access cont...Ieeepro techno solutions   2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...hemanthbbc
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...JPINFOTECH JAYAPRAKASH
 

Was ist angesagt? (18)

IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
 
Practice Fusion & MongoDB: Transitioning a 4 TB Audit Log from SQL Server to ...
Practice Fusion & MongoDB: Transitioning a 4 TB Audit Log from SQL Server to ...Practice Fusion & MongoDB: Transitioning a 4 TB Audit Log from SQL Server to ...
Practice Fusion & MongoDB: Transitioning a 4 TB Audit Log from SQL Server to ...
 
Open Cybersecurity Alliance Briefing at RSAC 2020
Open Cybersecurity Alliance Briefing at RSAC 2020Open Cybersecurity Alliance Briefing at RSAC 2020
Open Cybersecurity Alliance Briefing at RSAC 2020
 
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare Records
 
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data Mining
 
EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8
 
Knowledge Discovery using an Integrated Semantic Web
Knowledge Discovery using an Integrated Semantic WebKnowledge Discovery using an Integrated Semantic Web
Knowledge Discovery using an Integrated Semantic Web
 
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
 
IoT/Big Data Patent Claim Drafting Strategy under Post-Alice 101 Eligibility ...
IoT/Big Data Patent Claim Drafting Strategy under Post-Alice 101 Eligibility ...IoT/Big Data Patent Claim Drafting Strategy under Post-Alice 101 Eligibility ...
IoT/Big Data Patent Claim Drafting Strategy under Post-Alice 101 Eligibility ...
 
Neo4j for Discovering Drugs and Biomarkers
Neo4j for Discovering Drugs and BiomarkersNeo4j for Discovering Drugs and Biomarkers
Neo4j for Discovering Drugs and Biomarkers
 
Data security in genomics: A review of Australian privacy requirements and th...
Data security in genomics: A review of Australian privacy requirements and th...Data security in genomics: A review of Australian privacy requirements and th...
Data security in genomics: A review of Australian privacy requirements and th...
 
HealthBlock: A Secured Healthcare Data using Blockchain
HealthBlock: A Secured Healthcare Data using BlockchainHealthBlock: A Secured Healthcare Data using Blockchain
HealthBlock: A Secured Healthcare Data using Blockchain
 
Information Quality And Data Protection
Information Quality And Data ProtectionInformation Quality And Data Protection
Information Quality And Data Protection
 
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachPrivacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approach
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions   2014 ieee java project - decentralized access cont...Ieeepro techno solutions   2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...
 

Andere mochten auch

Your planet-needs-you-.
Your planet-needs-you-.Your planet-needs-you-.
Your planet-needs-you-.Ciara Reynolds
 
πολλατος
πολλατοςπολλατος
πολλατοςmatina65
 
Hibernate 映射配置文件详解
Hibernate 映射配置文件详解Hibernate 映射配置文件详解
Hibernate 映射配置文件详解wpscbbn405
 
Following the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsFollowing the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsBouneffouf Djallel
 
PISA 2009: Eleverna och nätet
PISA 2009: Eleverna och nätetPISA 2009: Eleverna och nätet
PISA 2009: Eleverna och nätetSkolverket
 

Andere mochten auch (7)

The woman
The womanThe woman
The woman
 
Your planet-needs-you-.
Your planet-needs-you-.Your planet-needs-you-.
Your planet-needs-you-.
 
πολλατος
πολλατοςπολλατος
πολλατος
 
Hibernate 映射配置文件详解
Hibernate 映射配置文件详解Hibernate 映射配置文件详解
Hibernate 映射配置文件详解
 
Following the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsFollowing the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systems
 
Penjelasan konvensi
Penjelasan konvensiPenjelasan konvensi
Penjelasan konvensi
 
PISA 2009: Eleverna och nätet
PISA 2009: Eleverna och nätetPISA 2009: Eleverna och nätet
PISA 2009: Eleverna och nätet
 

Ähnlich wie Cda accesscontrol-final2 (1)

Reduced acupulco cda access for bellagio
Reduced acupulco cda access for bellagioReduced acupulco cda access for bellagio
Reduced acupulco cda access for bellagioeyetech
 
Acupulco cda access v3-1
Acupulco cda access v3-1Acupulco cda access v3-1
Acupulco cda access v3-1eyetech
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
 
Regulating E Diaries… By Stephen A
Regulating E Diaries… By  Stephen  ARegulating E Diaries… By  Stephen  A
Regulating E Diaries… By Stephen AchallPHT
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionIRJET Journal
 
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...IRJET Journal
 
Medical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdfMedical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdfVishalSoni95234
 
A Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud ComputingA Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud ComputingIJMER
 
Intelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIntelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIRJET Journal
 
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaperRaúl van Riezen
 
A Survey on Decentralized e-health record with health insurance synchronization
A Survey on Decentralized e-health record with health insurance synchronizationA Survey on Decentralized e-health record with health insurance synchronization
A Survey on Decentralized e-health record with health insurance synchronizationIJAEMSJORNAL
 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET Journal
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...eSAT Journals
 
9541SafeAssign Originality ReportDatabase Sec
9541SafeAssign Originality ReportDatabase Sec9541SafeAssign Originality ReportDatabase Sec
9541SafeAssign Originality ReportDatabase Secromeliadoan
 
BLOCKCHAIN HYPERLEDGER IN MEDICAL FIELD.pdf
BLOCKCHAIN HYPERLEDGER IN MEDICAL FIELD.pdfBLOCKCHAIN HYPERLEDGER IN MEDICAL FIELD.pdf
BLOCKCHAIN HYPERLEDGER IN MEDICAL FIELD.pdfASHMILA K P
 
Cloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health RecordsCloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health Recordsijtsrd
 

Ähnlich wie Cda accesscontrol-final2 (1) (20)

Reduced acupulco cda access for bellagio
Reduced acupulco cda access for bellagioReduced acupulco cda access for bellagio
Reduced acupulco cda access for bellagio
 
Acupulco cda access v3-1
Acupulco cda access v3-1Acupulco cda access v3-1
Acupulco cda access v3-1
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 
Regulating E Diaries… By Stephen A
Regulating E Diaries… By  Stephen  ARegulating E Diaries… By  Stephen  A
Regulating E Diaries… By Stephen A
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
Kg3617691773
Kg3617691773Kg3617691773
Kg3617691773
 
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
 
Medical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdfMedical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdf
 
A Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud ComputingA Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud Computing
 
MEDBLOCK
MEDBLOCKMEDBLOCK
MEDBLOCK
 
Intelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIntelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosis
 
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
 
A Survey on Decentralized e-health record with health insurance synchronization
A Survey on Decentralized e-health record with health insurance synchronizationA Survey on Decentralized e-health record with health insurance synchronization
A Survey on Decentralized e-health record with health insurance synchronization
 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using Blockchain
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
 
9541SafeAssign Originality ReportDatabase Sec
9541SafeAssign Originality ReportDatabase Sec9541SafeAssign Originality ReportDatabase Sec
9541SafeAssign Originality ReportDatabase Sec
 
BLOCKCHAIN HYPERLEDGER IN MEDICAL FIELD.pdf
BLOCKCHAIN HYPERLEDGER IN MEDICAL FIELD.pdfBLOCKCHAIN HYPERLEDGER IN MEDICAL FIELD.pdf
BLOCKCHAIN HYPERLEDGER IN MEDICAL FIELD.pdf
 
Ibrahem
IbrahemIbrahem
Ibrahem
 
Cloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health RecordsCloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health Records
 

Mehr von eyetech

Timeless
TimelessTimeless
Timelesseyetech
 
Ranzo2010cataract audit
Ranzo2010cataract auditRanzo2010cataract audit
Ranzo2010cataract auditeyetech
 
Over the rim version 2
Over the rim version 2Over the rim version 2
Over the rim version 2eyetech
 
Access report final iso format 29 mar 2000
Access report final iso format 29 mar 2000Access report final iso format 29 mar 2000
Access report final iso format 29 mar 2000eyetech
 
Revised electronic medical record data model
Revised electronic medical record data modelRevised electronic medical record data model
Revised electronic medical record data modeleyetech
 
Model of the text generator
Model of the text generatorModel of the text generator
Model of the text generatoreyetech
 
Mirth measurement
Mirth measurementMirth measurement
Mirth measurementeyetech
 
The eye in the control of attention
The eye in the control of attentionThe eye in the control of attention
The eye in the control of attentioneyetech
 
The empty box
The empty boxThe empty box
The empty boxeyetech
 
Sydney 2002 plenary final
Sydney 2002 plenary finalSydney 2002 plenary final
Sydney 2002 plenary finaleyetech
 
Sight, truth and videotape final 12.8.05
Sight, truth and videotape final 12.8.05Sight, truth and videotape final 12.8.05
Sight, truth and videotape final 12.8.05eyetech
 
Health leaders conference (2)
Health leaders conference (2)Health leaders conference (2)
Health leaders conference (2)eyetech
 
Dunedin accessppt
Dunedin accesspptDunedin accessppt
Dunedin accessppteyetech
 
Melody of the text2
Melody of the text2Melody of the text2
Melody of the text2eyetech
 
Sydney 2002
Sydney 2002Sydney 2002
Sydney 2002eyetech
 
Over the rim version 3
Over the rim version 3Over the rim version 3
Over the rim version 3eyetech
 
Cataract audit as part of workflow
Cataract audit as part of workflowCataract audit as part of workflow
Cataract audit as part of workfloweyetech
 
April2010cataract audit
April2010cataract auditApril2010cataract audit
April2010cataract auditeyetech
 
Access standard fppt
Access standard fpptAccess standard fppt
Access standard fppteyetech
 
Access standard
Access standardAccess standard
Access standardeyetech
 

Mehr von eyetech (20)

Timeless
TimelessTimeless
Timeless
 
Ranzo2010cataract audit
Ranzo2010cataract auditRanzo2010cataract audit
Ranzo2010cataract audit
 
Over the rim version 2
Over the rim version 2Over the rim version 2
Over the rim version 2
 
Access report final iso format 29 mar 2000
Access report final iso format 29 mar 2000Access report final iso format 29 mar 2000
Access report final iso format 29 mar 2000
 
Revised electronic medical record data model
Revised electronic medical record data modelRevised electronic medical record data model
Revised electronic medical record data model
 
Model of the text generator
Model of the text generatorModel of the text generator
Model of the text generator
 
Mirth measurement
Mirth measurementMirth measurement
Mirth measurement
 
The eye in the control of attention
The eye in the control of attentionThe eye in the control of attention
The eye in the control of attention
 
The empty box
The empty boxThe empty box
The empty box
 
Sydney 2002 plenary final
Sydney 2002 plenary finalSydney 2002 plenary final
Sydney 2002 plenary final
 
Sight, truth and videotape final 12.8.05
Sight, truth and videotape final 12.8.05Sight, truth and videotape final 12.8.05
Sight, truth and videotape final 12.8.05
 
Health leaders conference (2)
Health leaders conference (2)Health leaders conference (2)
Health leaders conference (2)
 
Dunedin accessppt
Dunedin accesspptDunedin accessppt
Dunedin accessppt
 
Melody of the text2
Melody of the text2Melody of the text2
Melody of the text2
 
Sydney 2002
Sydney 2002Sydney 2002
Sydney 2002
 
Over the rim version 3
Over the rim version 3Over the rim version 3
Over the rim version 3
 
Cataract audit as part of workflow
Cataract audit as part of workflowCataract audit as part of workflow
Cataract audit as part of workflow
 
April2010cataract audit
April2010cataract auditApril2010cataract audit
April2010cataract audit
 
Access standard fppt
Access standard fpptAccess standard fppt
Access standard fppt
 
Access standard
Access standardAccess standard
Access standard
 

Cda accesscontrol-final2 (1)

  • 1. Berlin October 9 2002 Timaru Eye Clinic, New Zealand. CDA Access Control The Immunological Metaphor Mike Mair and Stephen Chu October 9, 2002, Berlin
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. The ‘effector’ end of the IGG molecule The recognition ends of the IGG
  • 8.
  • 9. IGM, the IGG pentameter
  • 10.
  • 11. Suggestions for inclusion in the Header : searchable meta-data to facilitate its use in access control. Will the rules for a document ontology do this? Document-class service+ condition, clinical category, practice setting, +role Include ‘role for access’ , similar to the CEN ‘distribution rule’ part 3 of the 4 part standard ENV 13606
  • 12.
  • 13.  
  • 14.  
  • 15. “ At the presentation to WG1 meeting in March 2001, Seoul, Korea, I mentioned that the CDA might function as the attestable unit, and the access lock might derive from a ‘detachable header’ for the CDA. “
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.  
  • 22. checkDocInfo( ) - object operation/method defined for the CDA Header/Access Object to get the meta-data information about the document as part of the matching function required to determine whether there is a match between the document requestor wants and the CDA header stored checkServeTarget( ) - also object operation/method defined for the CDA Header/Access Object to get the patient identified by the requestor for the CDA document required is the target patient for whom the CDA header (in the regional server list) was created for getOriginatingOrgNetID( ) is an operation/method defined for the the CDA Header/Access Object stored on the regional server. This operation will interrogate the CDA Header List stored in the regional server which should hold the Network ID/address of where the original attestable CDA data/documents are held - the Provider Organisation that created and stores the data/document, or the regional server itself.
  • 23.
  • 24. matchReq&DataAccessRole( ) - an object operation defined for the 'Access Lock' object to detemine whether the 'Role for Access' supplied by the 'Request Object' is of the legal role for access the data for which the 'Role for Access' attribute has been defined.
  • 25.
  • 26. We suggest four stages for a universal access control mechanism to accompany the CDA as the universal ‘attestable unit’ of healthcare.
  • 27.
  • 28.
  • 29.  
  • 30.
  • 31. Regional Server data store List of CDA Headers (or Access Objects) Provider Server data store Match found Locates CDA document source Attestable Unit Document information Encounter data Service actors Service targets Clinical digest Attestable Unit Document information Encounter data Service actors Service targets Clinical digest Which may be on its own data store
  • 32. Regional Server data store List of CDA Headers (or Access Objects) Provider Server data store Locates CDA document source Encrpytion key transfer Attestable Unit Document information Encounter data Service actors Service targets Clinical digest Access approved
  • 33.
  • 34. SSL SOAP security SOAP Envelope Digital signature Public key certificate SOAP encryption Role-base access control SSL SSL Regional (SOAP) Server Data store Regional (SOAP) Server Data store Requestor Data store Provider (originating Organization) Secure Socket Layer (SSL) Security Cleint/Server authentication Supporting SOAP encryption 2 CDA request in SOAP envelope 3 Route request to neigbour if necessary 3 Get complete CDA from Provider if request and access role matched 1 Request to neighbour server CDA Document in SOAP Envelop SOAP Security
  • 35. If the regional server that received the request for the CDA document cannot find a match on its CDA header list, it will pass on the request to a neighboring server, which will pass onto the next ...... until a match is found and the procedure of the previous paragraph will be performed, or it returns a ‘no find’ result. NB: This model assumes continuous ‘on line’ availability of data from providers.
  • 36.
  • 37.  
  • 38.
  • 39. Roles as self defining ‘autopoietic’ sets
  • 40.
  • 41. Provider Regional Network Requestor Retrieving CDAs from the network…….they might cling to the search sticks, like termites!
  • 42.
  • 43. Thank you for your attention Many thanks to the organizers of this wonderful event