Analysis, Design and Implementation of Secure and Interoperable Distributed Health Information Systems

Front Cover
IOS Press, 2002 - Business & Economics - 334 pages
0 Reviews
This book is an introduction into methodology and practice of analysis, design and implementation of distributed health information systems. Special attention is dedicated to security and interoperability of such systems as well as to advanced electronic health record approaches. In the book, both available architectures and implementations but also current and future innovations are considered. Therefore, the component paradigm, UML, XML, eHealth are discussed in a concise way. Many practical solutions specified and implemented first in the author's environment are presented in greater detail. The book addresses information scientists, administrators, health professionals, managers and other users of health information systems.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

INTRODUCTION
1
Table of Figures
2
10
6
PARADIGM CHANGES IN HEALTH INFORMATION SYSTEMS
8
COMPARING IMPLEMENTED MIDDLEWARE CONCEPTS FOR ADVANCED
14
Table of Tables
29
Communication levels of components Saleck 1997b
43
CORBA HL7 V2 x early V3 DHE
45
Roles and Activities in the TTP Services Context
150
The ISO Public Key Infrastructure Technical Specification
155
13
156
Highlights of the Clinical Cancer Registry MagdeburgSaxonyAnhalt
160
Architecture and Services of the Pilot TTP
162
SUMMARY AND CONCLUSIONS
169
Threats and Security Services in the Context of Communication Security
172
Merging secured Data Elements to EDI Messages
192

Figure 11
49
Figure 12
57
Figure 10
61
CORBA3 COMPONENT ARCHITECTURE
63
Figure 20
64
Main Characteristics of the Main EHR Approaches
70
A SYSTEMATIC APPROACH FOR SECURE HEALTH INFORMATION SYSTEMS
71
Security Services Provided by Protocols on Different ISOOSI Model Layers
76
DOMAIN MODEL AND DOMAIN INTEROPERABILITY
77
HEALTH USE CASE EXAMPLES
83
1
84
Figure 11
90
2
91
Derived Issues on Application Security
95
Attestation and Assignment
103
The ETSI XML Advanced Digital Signatures Standard
109
TTP Services
114
SUMMARY AND CONCLUSIONS
117
Legal Issues Classification
120
SECURITY MODELS FOR OPEN ARCHITECTURE CONCEPTS
133
CORBA Terminology Query Service formerly Lexicon Query Service
141
SECURITY TOOLKITS
149
Key Separation by Key Usage
194
The Secure File Transfer Protocol SFTP
209
Valid Values for the TAGbyte
212
IMPLEMENTATIONS
216
1
228
A FUTUREPROOF CONCEPT FOR DISTRIBUTED INTELLIGENT HEALTH
234
HARP_WWW
238
THE HARP CLINICAL STUDY DEMONSTRATOR
243
DECISION SUPPORT SYSTEMS
252
5
258
CONCLUSIONS
260
REFERENCES
271
NORMATIVE REFERENCES
287
TRUSTHEALTH2 PILOT REQUIREMENTS AND SOLUTIONS
294
Secure file transfer protocol SFTP
301
EXAMPLE FORSMIME VERSION 2
309
Impact of Application Security Services and their intended Usage
313
Directory Services
316
Security Services for the Paradox Database PDD
324
Impact Regarding Confidentiality of Communication 328
329
Copyright

Common terms and phrases

References to this book

All Book Search results »

Bibliographic information