Skip to main content
Top
Published in: Journal of Digital Imaging 4/2003

01-12-2003

Security Middleware Infrastructure for DICOM Images in Health Information Systems

Authors: Vijay N. V. Kallepalli, M.Sc., Sylvanus A. Ehikioya, Ph.D., Sergio Camorlinga, M.Sc., Jose A. Rueda, Ph.D.

Published in: Journal of Imaging Informatics in Medicine | Issue 4/2003

Login to get access

Abstract

In health care, it is mandatory to maintain the privacy and confidentiality of medical data. To achieve this, a fine-grained access control and an access log for accessing medical images are two important aspects that need to be considered in health care systems. Fine-grained access control provides access to medical data only to authorized persons based on priority, location, and content. A log captures each attempt to access medical data. This article describes an overall middleware infrastructure required for secure access to Digital Imaging and Communication in Medicine (DICOM) images, with an emphasis on access control and log maintenance. We introduce a hybrid access control model that combines the properties of two existing models. A trust relationship between hospitals is used to make the hybrid access control model scalable across hospitals. We also discuss events that have to be logged and where the log has to be maintained. A prototype of security middleware infrastructure is implemented.
Literature
2.
go back to reference Vazquez-Naya, JM, Loureiro, JP, Dorado, J, et al. 2002Necessary security mechanism in a PACS DICOM access system with Web technology.J Digit Imaging. (Special Issue on Inconsistency Management, Society of Computer Applications in Radiology)15107111 Vazquez-Naya, JM, Loureiro, JP, Dorado, J,  et al. 2002Necessary security mechanism in a PACS DICOM access system with Web technology.J Digit Imaging. (Special Issue on Inconsistency Management, Society of Computer Applications in Radiology)15107111
3.
go back to reference A Guide to Understanding Discretionary Access Control. National Computer Security Center, NCSC-TG-01, Version-01, Fort George G. Meade, MD, June 1998 A Guide to Understanding Discretionary Access Control. National Computer Security Center, NCSC-TG-01, Version-01, Fort George G. Meade, MD, June 1998
4.
go back to reference Lee TMP: Using mandatory integrity to enforce commercial security. Proceedings of IEEE Computer Society Symposium on Security and Privacy (Oakland, CA), May 1998, pp. 140-146 Lee TMP: Using mandatory integrity to enforce commercial security. Proceedings of IEEE Computer Society Symposium on Security and Privacy (Oakland, CA), May 1998, pp. 140-146
5.
go back to reference Ferraiolo D, Kuhn R: Role-based access control. proceedings of 15th NIST-NCSC National Computer Security Conference (Baltimore, MD), October 1992 Ferraiolo D, Kuhn R: Role-based access control. proceedings of 15th NIST-NCSC National Computer Security Conference (Baltimore, MD), October 1992
6.
go back to reference Chandramouli R: A framework for multiple authorization types in healthcare application systems. Proceedings of 17th Annual Computer Security Applications Conference (New Orleans, LA), December 2001 Chandramouli R: A framework for multiple authorization types in healthcare application systems. Proceedings of 17th Annual Computer Security Applications Conference (New Orleans, LA), December 2001
7.
go back to reference Thomas RK: Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. Proceedings of the 2nd ACM Workshop on Role-based Access Control (RBAC’97) (Fairfax, VA), November 1997, pp. 13-19 Thomas RK: Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. Proceedings of the 2nd ACM Workshop on Role-based Access Control (RBAC’97) (Fairfax, VA), November 1997, pp. 13-19
8.
go back to reference Zhang L, Ahn GJ, Chu BT: A role-based delegation framework for health care information system. Proceedings of 7th ACM Symposium on Access Control Models and Technologies (SACMAT’02) (Monterey, CA), June 2002 Zhang L, Ahn GJ, Chu BT: A role-based delegation framework for health care information system. Proceedings of 7th ACM Symposium on Access Control Models and Technologies (SACMAT’02) (Monterey, CA), June 2002
10.
go back to reference Axelsson S: Intrusion detection systems: a survey and taxonomy. Technical Report 99-15, Department of Computer Engineering, Chalmers University of Technology, SE-41296 Göteborg, Sweden, March 2000 Axelsson S: Intrusion detection systems: a survey and taxonomy. Technical Report 99-15, Department of Computer Engineering, Chalmers University of Technology, SE-41296 Göteborg, Sweden, March 2000
11.
go back to reference Digital Imaging and Communications in Medicine2002Standard, Security Profiles.National Electrical Manufactures AssociationRosslyn, VA Digital Imaging and Communications in Medicine2002Standard, Security Profiles.National Electrical Manufactures AssociationRosslyn, VA
Metadata
Title
Security Middleware Infrastructure for DICOM Images in Health Information Systems
Authors
Vijay N. V. Kallepalli, M.Sc.
Sylvanus A. Ehikioya, Ph.D.
Sergio Camorlinga, M.Sc.
Jose A. Rueda, Ph.D.
Publication date
01-12-2003
Publisher
Springer-Verlag
Published in
Journal of Imaging Informatics in Medicine / Issue 4/2003
Print ISSN: 2948-2925
Electronic ISSN: 2948-2933
DOI
https://doi.org/10.1007/s10278-003-1710-7

Other articles of this Issue 4/2003

Journal of Digital Imaging 4/2003 Go to the issue

OriginalPaper

Author-Title Index