The design and implementation of a novel security model for HealthAgents

In this paper, we analyze the special security requirements for software support in health care and the HealthAgents system in particular. Our security solution consists of a link-anonymized data scheme, a secure data transportation service, a secure data sharing and collection service, and a more advanced access control mechanism. The novel security service architecture, as part of the integrated system architecture, provides a secure health-care infrastructure for HealthAgents and can be easily adapted for other health-care applications.

[1]  Liang Xiao,et al.  Adaptive Agent Model: Software Adaptivity using an Agent-oriented Model-Driven Architecture , 2009, Inf. Softw. Technol..

[2]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[3]  Liang Xiao,et al.  Towards agent-oriented model-driven architecture , 2007, Eur. J. Inf. Syst..

[4]  Ross J. Anderson,et al.  Clinical system security: interim guidelines , 1996, BMJ.

[5]  Gail-Joon Ahn,et al.  A role-based delegation framework for healthcare information systems , 2002, SACMAT '02.

[6]  R Anderson Undermining data privacy in health information , 2001, BMJ : British Medical Journal.

[7]  Sabine Van Huffel,et al.  HealthAgents: distributed multi-agent brain tumor diagnosis and prognosis , 2009, Applied Intelligence.

[8]  David Stuart Robertson,et al.  A Lightweight Coordination Calculus for Agent Systems , 2004, DALT.

[9]  Stefan Kirn,et al.  Agent.Hospital - agent-based open framework for clinical applications , 2003, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003..

[10]  J. Ferlay,et al.  Estimates of cancer incidence and mortality in Europe in 1995. , 2002, European journal of cancer.

[11]  Liang Xiao,et al.  Secure Interaction Models for the HealthAgents System , 2008, SAFECOMP.

[12]  Sun K. Yoo,et al.  Web-based secure access from multiple patient repositories , 2008, Int. J. Medical Informatics.

[13]  Liang Xiao,et al.  Developing a security protocol for a distributed decision support system in a healthcare environment , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.

[14]  Liang Xiao,et al.  An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[15]  Costas Lambrinoudakis,et al.  A security architecture for interconnecting health information systems , 2004, Int. J. Medical Informatics.

[16]  J. Keese,et al.  Pro-active approach to malware for healthcare information and imaging systems , 2005 .

[17]  Liang Xiao,et al.  Expressive security policy rules using Layered Conceptual Graphs , 2007, Knowl. Based Syst..

[18]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[19]  Angela Sasse,et al.  Humans in the Loop Human – Computer Interaction and Security , 2022 .

[20]  Walter F. Tichy,et al.  Proceedings 25th International Conference on Software Engineering , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..

[21]  L. Johnson,et al.  Minimum Security Requirements for Federal Information and Information Systems , 2006 .