A search engine for virtual patient records

Virtual patient records provide a means for integrated access to patient information that may be scattered around different healthcare settings. Within the boundaries of a health district providing all levels of care, this concept can be implemented in an Intranet environment to support longitudinal patient care activities across the participating healthcare providers. Since medical information is stored on multiple Intranet sites in various forms (e.g. codified data, transcribed documents, and images), a suite of appropriate tools is needed to enable access to such information in combined form. In most cases, however, access to medical information should be restricted to authorized users. To serve this purpose, a prototype search engine incorporating an authorization and access control functionality has been developed and presented in this paper. The system is based on the signature file access method and an experimental implementation written in JAVA is also described.

[1]  P Suetens,et al.  Using WWW and JAVA for image access and interactive viewing in an integrated PACS. , 1997, Medical informatics = Medecine et informatique.

[2]  Marianne Winslett,et al.  Authorization in the digital library: secure access to services across enterprise boundaries , 1996, Proceedings of the Third Forum on Research and Technology Advances in Digital Libraries,.

[3]  Randolph C. Barrows,et al.  Review: Privacy, Confidentiality, and Electronic Medical Records , 1996, J. Am. Medical Informatics Assoc..

[4]  Philip Greenspun,et al.  Application of Technology: Building National Electronic Medical Record Systems via the World Wide Web , 1996, J. Am. Medical Informatics Assoc..

[5]  Nassrin Tavakoli,et al.  A New Signature Approach for Retrieval of Documents from Free-Text Databases , 1992, Inf. Process. Manag..

[6]  Elisa Bertino,et al.  An Approach to Authorization Modeling in Object-Oriented Database Systems , 1994, Data Knowl. Eng..

[7]  Dik Lun Lee,et al.  Optimal weight assignment for signature generation , 1992, TODS.

[8]  Simon S. Lam,et al.  Authorizations in Distributed Systems: A New Approach , 1993, J. Comput. Secur..

[9]  David W. Forslund,et al.  An international collaboratory based on virtual patient records , 1997, CACM.

[10]  W N Zelman,et al.  Strategic, operational, and marketing concerns of product-line management in health care , 1990, Health care management review.

[11]  Daniel J. Berg,et al.  Advanced techniques for Java developers , 1998 .

[12]  R. P. C. Rodgers Brief Review: Java and its Future in Biomedical Computing , 1996, J. Am. Medical Informatics Assoc..

[13]  J. Renaud-salis,et al.  A web interface for multimedia electronic patient record: consensual validation of the Aquitaine Health Information Network prototypes. , 1998, Medical informatics = Medecine et informatique.

[14]  Dik Lun Lee,et al.  Efficient Signature File Methods for Text Retrieval , 1995, IEEE Trans. Knowl. Data Eng..

[15]  G Vassilacopoulos,et al.  A front end authorization mechanism for hospital information systems. , 1996, Medical informatics = Medecine et informatique.

[16]  L. G. Lawrence The role of roles , 1993, Comput. Secur..

[17]  E. B. Steen,et al.  The Computer-Based Patient Record: An Essential Technology for Health Care , 1992, Annals of Internal Medicine.

[18]  Dick Lefkon Seven work plans for year-2000 upgrade projects , 1997, CACM.

[19]  J Cooper,et al.  Security considerations for present and future medical databases. , 1996, International journal of bio-medical computing.

[20]  Ron D. Appel,et al.  In-house access to PACS images and related data through World Wide Web , 1996 .

[21]  Curtis P. McLaughlin,et al.  Continuous Quality Improvement in Health Care: Theory, Implementation, and Applications , 1994 .

[22]  E Fotsch Finding value in medical intranets. , 1997, Healthcare financial management : journal of the Healthcare Financial Management Association.