Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 20 Jan 2012

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

The security and privacy of usage policies and provenance logs in an Information Accountability Framework

Grunwell, D., Gajanayake, R. and Sahama, T.

    The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.
Cite as: Grunwell, D., Gajanayake, R. and Sahama, T. (2015). The security and privacy of usage policies and provenance logs in an Information Accountability Framework. In Proc. 8th Australasian Workshop on Health Informatics and Knowledge Management (HIKM 2015) Sydney, Australia. CRPIT, 164. Maeder, A. and Warren, J. Eds., ACS. 33-40
pdf (from crpit.com) pdf (local if available) BibTeX EndNote GS