A model for dimensioning a secure event-driven health care system

Privacy is close to the user information and thus, present in any ubiquitous computing scenario. In this sense, privacy in identity management is gaining more importance, since IdM systems deal with services that requires sharing attributes belonging to users' identity with different entities across security domains. However, the effective revocation consent -considered as a privacy rule in sensitive scenarios- has not been fully addressed. This article builds on the flexible event-based user consent-revocation mechanism defined in [4] for health care scenarios. In this article we analyze the network dimensioning to calculate the overhead of activating/deactivating attributes and privileges, as subscription and notification event messages exchanged. We consider two main simulation scenarios: a large hospital, and a small-medium hospital.

[1]  K. Cameron The Laws of Identity , 2005 .

[2]  Linda V. Green,et al.  Queueing Analysis in Health Care , 2013 .

[3]  Jeffrey W. Herrmann,et al.  A Survey of Queuing Theory Applications in Healthcare , 2007 .

[4]  Renato Cesar Sato,et al.  Markov Models in health care. , 2010, Einstein.

[5]  Adam Roach,et al.  Session Initiation Protocol (SIP)-Specific Event Notification , 2002, RFC.

[6]  Jörg Schwenk,et al.  Risks of the CardSpace Protocol , 2009, ISC.

[7]  Mateo Restrepo,et al.  Erlang loss models for the static deployment of ambulances , 2009, Health care management science.

[8]  Andrés Marín López,et al.  An Event Driven Hybrid Identity Management Approach to Privacy Enhanced e-Health , 2012, Sensors.

[9]  Carl M. Harris,et al.  Fundamentals of Queueing Theory: Gross/Fundamentals of Queueing Theory , 2008 .

[10]  Bohn Stafleu van Loghum,et al.  Online … , 2002, LOG IN.

[11]  Volker Hilt,et al.  Controlling overload in networks of SIP servers , 2008, 2008 IEEE International Conference on Network Protocols.

[12]  Eric Noel,et al.  Novel overload controls for SIP networks , 2009, 2009 21st International Teletraffic Congress.

[13]  Chao Liu,et al.  Efficient SIP-Specific Event Notification , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).

[14]  R. Syski,et al.  Fundamentals of Queueing Theory , 1999, Technometrics.

[15]  Jolene Galegher,et al.  The Health Insurance Portability and Accountability Act Privacy Rule: A Practical Guide for Researchers , 2004, Medical care.

[16]  Changcheng Huang,et al.  Stability condition for SIP retransmission mechanism: Analysis and performance evaluation , 2010, Proceedings of the 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS '10).

[17]  Chris J. Mitchell,et al.  Improving the Security of CardSpace , 2009, EURASIP J. Inf. Secur..

[18]  E. Litvak,et al.  Queuing Theory Accurately Models the Need for Critical Care Resources , 2004, Anesthesiology.

[19]  G. Koole,et al.  Waiting times of scheduled patients in the presence of emergency requests , 2005 .

[20]  S. Zeger,et al.  The challenge of predicting demand for emergency department services. , 2008, Academic emergency medicine : official journal of the Society for Academic Emergency Medicine.

[21]  W. Ryan,et al.  Privacy and freedom: Alan F. Westin Atheneum Publishers, $10 , 1967 .

[22]  L. Green How Many Hospital Beds? , 2002, Inquiry : a journal of medical care organization, provision and financing.