skip to main content
10.1145/1579114.1579186acmotherconferencesArticle/Chapter ViewAbstractPublication PagespetraConference Proceedingsconference-collections
research-article

Security and trust in virtual healthcare communities

Published:09 June 2009Publication History

ABSTRACT

The main purpose of a virtual healthcare community is to enforce members' collaboration and allow them collectively conduct health care activities. Patient monitoring and medical consultation and support are the most popular activities inside health care communities. They bring together medical experts and patients and require confidentiality, reliability and trust in order to be successful. An examination of existing virtual communities for healthcare leads to the conclusion that many of them fail to meet requirements for building trust. Several ethical, legal and technical issues must be considered in order to build a trustful community. This work presents the architecture of a virtual healthcare community portal with emphasis on the issues that help building trust inside the community. With a set of hypothetical usage scenarios that challenge trust in the community we uncover healthcare community's pitfalls and illustrate the solutions provided by the proposed architecture.

References

  1. Apostolakis, I., Chryssanthou, A., Varlamis, I. 2009. A Holistic Perspective of Security in Health Related Virtual Communities, in Handbook of Research on Distributed Medical Informatics and E-Health, IGI Global.Google ScholarGoogle Scholar
  2. Becker, M. Y., Fournet, C., Gordon, A. D. 2007. Design and Semantics of a Decentralized Authorization Language. In the 20th IEEE Computer Security Foundations Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Becker, M. Y., Sewell, P. 2004. Cassandra: Flexible Trust Management Applied to Electronic Health Records. In the 17th IEEE Workshop on Computer Security Foundations. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Blaze, M., Kannan, S., Lee, I., et al. 2009. Dynamic Trust Management. In IEEE Computer Magazine, pp. 42, no. 2, pp. 44--52, February 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Demiris, G. 2005. Virtual Communities in Health Care, in StudFuzz 184, 121--122, Springer-Verlag.Google ScholarGoogle Scholar
  6. Demiris, G., Parker, O. D., Fleming, D., Edison, K. 2004. Hospice Staff Attitudes towards "Telehospice". In American Journal of Hospice and Palliative Care 2004; 21(5): 343--348.Google ScholarGoogle Scholar
  7. Dorothy, W., Curtis, M. S., Esteban, J. et al. 2008. SMART - An Integrated, Wireless System for Monitoring Unattended Patients. In JAMIA January 2008;15:44--53.Google ScholarGoogle Scholar
  8. European Council. 1997. Explanatory Memorandum to Recommendation (97) 5 on the Protection of Medical Data.Google ScholarGoogle Scholar
  9. European Parliament, EU Council. 1995. Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data.Google ScholarGoogle Scholar
  10. Greek Data Protection Act. 1997. Law 2472/1997, Protection of individuals from sensitive personal data processing. GreeceGoogle ScholarGoogle Scholar
  11. Jones, V. M., van Halteren, A. T., Dokovski, N. T. et al. 2006. Mobihealth: mobile services for health professionals. In: M-Health Emerging Mobile Health Systems. Istepanian. Laxminarayan & Pattichis (Eds.), Kluwer.Google ScholarGoogle Scholar
  12. Kui, M., Yue, W., Xu, Z., Xiaochun, X., Gengdu, Z. 2005. A Trust Management Model for Virtual Communities. In the 5th Int. Conf. on Computer and Information Technology. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Laleci, G. B., et al Dogac, A., Olduz, et al. 2008. SAPHIRE: A Multi-Agent System for Remote Healthcare Monitoring through Computerized Clinical Guidelines, in Agent Technology and e-Health, Whitestein. pp. 25--44Google ScholarGoogle Scholar
  14. Lorincz, K., Malan, D. J., Fulford-Jones, T. R. F. et al. 2004. Sensor networks for emergency response: challenges and opportunities, in IEEE Pervasive Computing;3;16--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Maji, A. K., Mukhoty, A., Majumdar, A. K. et al. 2008. Security Analysis and Implementation of web-based telemedicine services with a four-tier-architecture. In proceedings of the 2nd Int. Conf. on Pervasive Computing Technologies for Healthcare, pp 46--54.Google ScholarGoogle Scholar
  16. McClure, S., Scambray, J., Kurtz, G. 2003. Hacking Exposed: Network Security Secrets and Solutions, Fourth edition, 2003, McGraw-Hill/Osborne, pp. 503 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Mondy, J., Torresi, M. 2008. CIGNA Creating a Virtual Health Care Community. Article released July 1, 2008 at http://newsroom.cigna.com/Google ScholarGoogle Scholar
  18. Ng, H. S., Sim, M. L., Tan, C. M. 2006. Security issues of wireless sensor networks in healthcare applications. In BT Technology Journal 24, 2, 138--144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. OASIS. eXtensible Access Control Markup Language (XACML) Version 2.0 core specification, 2005. At www.oasis-open.org/committees/xacml/Google ScholarGoogle Scholar
  20. Orrin, S. 2004. The twelve most common application level hack attacks, Wathcfire whitepaper. Available at: http://www.emedia.co.uk/FM/GetFile.aspx?id=58740Google ScholarGoogle Scholar
  21. Schopp, L. H., Hales, J. W. et al. 2004. Design of a Peer-to-Peer Telerehabilitation Model. In Telemedicine Journal and e-Health Jun 2004, 10(2): 243--251Google ScholarGoogle ScholarCross RefCross Ref
  22. Seamons, K., Winslett, M., Yu, T., Yu, L., Jarvis, R. 2002. Protecting privacy during on-line trust negotiation. 2nd Workshop on Privacy Enhancing Technologies. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Stanberry, B. 1998. The legal and ethical aspects of telemedicine. Data protection, security and European law. In Journal of Telemedicine and Telecare, 1998;4(1): 18--24.Google ScholarGoogle ScholarCross RefCross Ref
  24. U.S. Department of Health and Human Services, Office for Civil Rights. 2003. Standards for privacy of individually identifiable health information, U.S.Google ScholarGoogle Scholar
  25. Varlamis, I. and Apostolakis, I. 2007, Self supportive web communities in the service of patients. In proceedings of the Int. Conf. on Web Based Communities, IADIS.Google ScholarGoogle Scholar
  26. Wang, X., Lao, G., DeMartini, T., Reddy, H., Nguyen, M., Valenzuela, E. 2002. XrML - eXtensible rights Markup Language. In Proc of XML Security. XMLSEC '02. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Warren, S., Lebak, J., Yao, J., et al. 2005. Interoperability and Security in Wireless Body Area Network Infrastructures. In IEEE-EMBS 2005, pp. 3837--38Google ScholarGoogle Scholar

Index Terms

  1. Security and trust in virtual healthcare communities

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            PETRA '09: Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
            June 2009
            481 pages
            ISBN:9781605584096
            DOI:10.1145/1579114

            Copyright © 2009 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 9 June 2009

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader