Data Mining in Medical Record Access Logs

Background. The necessary logging of all transactions of a computerized medical record system creates voluminous access logs. One use for access logs is the auditing mechanism that is described by the proposed HIPAA security regula-tions'. Because of the typically large numbers of access records, it is crucial to focus the attention of auditing efforts. Data mining has been studied and used extensively in security applications, particularly in attempts to identify network intru