Identity Management and Audit Trail Support for Privacy Protection in E-Health Networks

Identity Management and Audit Trail Support for Privacy Protection in E-Health Networks

Liam Peyton, Jun Hu
ISBN13: 9781616928957|ISBN10: 1616928956|EISBN13: 9781616928971
DOI: 10.4018/978-1-61692-895-7.ch008
Cite Chapter Cite Chapter

MLA

Peyton, Liam, and Jun Hu. "Identity Management and Audit Trail Support for Privacy Protection in E-Health Networks." Certification and Security in Health-Related Web Applications: Concepts and Solutions, edited by Anargyros Chryssanthou, et al., IGI Global, 2011, pp. 160-173. https://doi.org/10.4018/978-1-61692-895-7.ch008

APA

Peyton, L. & Hu, J. (2011). Identity Management and Audit Trail Support for Privacy Protection in E-Health Networks. In A. Chryssanthou, I. Apostolakis, & I. Varlamis (Eds.), Certification and Security in Health-Related Web Applications: Concepts and Solutions (pp. 160-173). IGI Global. https://doi.org/10.4018/978-1-61692-895-7.ch008

Chicago

Peyton, Liam, and Jun Hu. "Identity Management and Audit Trail Support for Privacy Protection in E-Health Networks." In Certification and Security in Health-Related Web Applications: Concepts and Solutions, edited by Anargyros Chryssanthou, Ioannis Apostolakis, and Iraklis Varlamis, 160-173. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-61692-895-7.ch008

Export Reference

Mendeley
Favorite

Abstract

E-health networks can enable integrated healthcare services and data interoperability in the form of electronic health records accessible via Internet technology. Efficiency and quality of care can be improved for example by: streamlining administrative processes involving prescriptions and insurance payments; providing remote access to specialists through telemedicine; or correlating data from clinics, pharmacies and emergency rooms to detect potential adverse events. However, a major requirement to enable adoption of e-health networks is the ability to address issues around security, privacy and trust in a systematic manner. In particular, privacy legislation, regulatory guidelines, and organizational policies require that a framework for privacy protection must be established. Federated identity management can be used to systematically protect patient and health care provider identities in a single sign on framework that controls access to patient data, but an audit trail and reporting mechanism is needed in order to ensure and validate compliance. In this chapter, the authors use example e-health scenarios to analyze the legal, business and technical issues that need to be addressed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.