DocumentCode :
1876861
Title :
Security middleware infrastructure for medical imaging system integration
Author :
Weina Ma ; Sartipi, Kamran ; Sharghigoorabi, Mohammadhassan
Author_Institution :
Dept. of Electr., Univ. of Ontario Inst. of Technol., Oshawa, ON, Canada
fYear :
2015
fDate :
1-3 July 2015
Firstpage :
353
Lastpage :
357
Abstract :
With the increasing demand of electronic medical records sharing, it is a challenge for medical imaging service providers to protect the patient privacy and secure their IT infrastructure in an integrated environment. In this paper, we present a novel security middleware infrastructure for seamlessly and securely linking legacy medical imaging systems, diagnostic imaging web applications as well as mobile applications. Software agent such as user agent and security agent have been integrated into medical imaging domains that can be trained to perform tasks. The proposed security middleware utilizes both online security technologies such as authentication, authorization and accounting, and post security procedures to discover system security vulnerability. By integrating with the proposed security middleware, both legacy system users and Internet users can be uniformly identified and authenticated; access to patient diagnostic images can be controlled based on patient´s consent directives and other access control polices defined at a central point; relevant user access activities can be audited at a central repository; user access behaviour patterns are mined to refine existing security policies. A case study is presented based on the proposed infrastructure.
Keywords :
authorisation; data privacy; medical image processing; middleware; software agents; IT infrastructure security; accounting technology; authentication technology; authorization technology; diagnostic imaging Web applications; electronic medical records; information technology; legacy medical imaging systems; medical imaging service providers; medical imaging system integration; mobile applications; patient privacy; security agent; security middleware infrastructure; software agent; system security vulnerability; user agent; Authentication; Authorization; Biomedical imaging; Middleware; Picture archiving and communication systems; Access Control; Agent; Behaviour Pattern; Medical Imaging; Middleware; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Communication Technology (ICACT), 2015 17th International Conference on
Conference_Location :
Seoul
Print_ISBN :
978-8-9968-6504-9
Type :
conf
DOI :
10.1109/ICACT.2015.7224818
Filename :
7224818
Link To Document :
بازگشت