Cda accesscontrol-final2 (1)

255 views
203 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
255
On SlideShare
0
From Embeds
0
Number of Embeds
18
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cda accesscontrol-final2 (1)

  1. 1. Berlin October 9 2002 Timaru Eye Clinic, New Zealand. CDA Access Control The Immunological Metaphor Mike Mair and Stephen Chu October 9, 2002, Berlin
  2. 2. <ul><li>Stephen Chu, PhD, FACS Mike Mair FRACO </li></ul><ul><li>Associate Professor of Health Informatics Ophthalmologist </li></ul><ul><li>Department of Management Science & Information Systems Timaru Eye Clinic </li></ul><ul><li>University of Auckland POB 319 </li></ul><ul><li>P.O. Box 92 019 Timaru </li></ul><ul><li>Auckland New Zealand </li></ul><ul><li>New Zealand </li></ul><ul><li>Phone: 64 9 373 7599 Ext 7716 Phone: 64 3 6848515 </li></ul><ul><li>Fax: 64 9 373 7430 Fax: 64 3 6848531 </li></ul><ul><li>Email: stephen.chu@auckland.ac.nz mikemair@eyetech.co.nz </li></ul><ul><ul><li>Disclaimer: Although the Health Event Summary and Clinical Document Architecture have caused a lot of interest in New Zealand, we cannot claim to be part of an official NZ project at this time. </li></ul></ul>
  3. 3. <ul><li>The Clinical Data Architecture (CDA) is proposed as a common currency for electronic healthcare. </li></ul><ul><li>It might also be complemented by a single global technique for access control. </li></ul><ul><li>Gunnar Klein (who chairs CEN 251 and ISOTC/215 WG4 Security) recently said: </li></ul><ul><ul><ul><li>‘ Do not expect quick solutions to the dream for a universal shared record which takes privacy concerns seriously’ </li></ul></ul></ul><ul><li>He suggests that security is the ‘forgotten requirement for interoperability.’ </li></ul>
  4. 4. <ul><li>In order to fulfill the dream of a universal shared record standard, there must also be a shared technique for discriminating legitimate from illegitimate sharing. </li></ul><ul><li>That technique must be endlessly customizable because of the great diversity of access practices in global healthcare. </li></ul><ul><li>Kai Heitmann said in discussion on 8.10.02: “ we need an agreed way of doing transport and security mechanisms where local legislative requirements can be embedded” </li></ul>
  5. 5. <ul><li>A New Zealand team prepared an Access Proposal to WG1 of ISOTC/215. </li></ul><ul><li>We called for the creation of a universal healthcare packet, which we termed the ‘attestable unit’. </li></ul><ul><li>It was paired with an ‘access lock’ for a universal access mechanism. </li></ul><ul><li>This was modeled on the ‘bifunctional’ immunoglobulin family of molecules of immunological science. </li></ul>
  6. 6. In the immune system <ul><li>… .a single class of molecules, the immunoglobulin, exhibits bi-functionality in that each molecule has a ‘recognition’ end and a ‘business’ end. The recognition end which is highly variable, targets antigen, which is usually but not always material foreign to the organism. The ‘business end’, which is not variable, determines what action the molecule performs when the template match to antigen is made. </li></ul>
  7. 7. The ‘effector’ end of the IGG molecule The recognition ends of the IGG
  8. 8. Immunoglobulin Structure <ul><li>The amino acid sequence in the tips of the &quot;Y&quot; varies greatly among different antibodies. This variable region, composed of 110-130 amino acids, gives the antibody its specificity for binding antigen. The variable region includes the ends of the light and heavy chains. The constant region determines the mechanism used to destroy antigen. </li></ul>
  9. 9. IGM, the IGG pentameter
  10. 10. The universal role for immunoglobulin <ul><li>In the body the immunoglobulin molecule is pervasive </li></ul><ul><li>Acts as a transmitter, a hormone, an activator, a switch, a bullet... </li></ul><ul><li>it can be extremely specific in its target, or very general </li></ul><ul><li>Nature has implemented a single design, </li></ul><ul><li>If we can get a universal access control process for the CDA, could it do the same for health informatics? </li></ul>
  11. 11. Suggestions for inclusion in the Header : searchable meta-data to facilitate its use in access control. Will the rules for a document ontology do this? Document-class service+ condition, clinical category, practice setting, +role Include ‘role for access’ , similar to the CEN ‘distribution rule’ part 3 of the 4 part standard ENV 13606
  12. 12. <ul><li>The ‘access lock’ concept for the attestable unit was to act as a pointer to the attestable unit. </li></ul><ul><li>We suggested that a ‘search object’ should activate it. </li></ul><ul><li>We evoked dual key cryptography for the actual retrieval of the unit. </li></ul><ul><li>The data would remain with the system of origin, along with the audit trail of the 5 WH of instances of access to the data </li></ul>The ISOTC/215 Access Proposal
  13. 15. “ At the presentation to WG1 meeting in March 2001, Seoul, Korea, I mentioned that the CDA might function as the attestable unit, and the access lock might derive from a ‘detachable header’ for the CDA. “
  14. 16. Detachable Header
  15. 17. The Health Event Summary (HES) <ul><li>derived originally from the Australian ‘Health Connect’ organization </li></ul><ul><li>It is a summary ‘package’ of healthcare data in standard format to be created with every ‘health event’, and is planned as a ‘shortcut’ to interoperability of healthcare data. </li></ul><ul><li>Its implementation was one of the recommendations of the NZ Ministry of Health ‘Wave’ project ( Working to Add Value to Electronic Medicine) </li></ul>
  16. 18. The Clinical Document Architecture as HES (Chu et al 2002) <ul><li>The CDA is designed to be just such an attestable global unit of healthcare. Its definition includes: </li></ul><ul><li>Persistence </li></ul><ul><li>Wholeness </li></ul><ul><li>Stewardship </li></ul><ul><li>Potential for authentication. </li></ul>
  17. 19. <ul><ul><ul><li>“ For communications over public media, cryptographic techniques for source/recipient authentication and secure transport of encapsulated documents may be required, and should be addressed with commercially available tools outside the scope of this standard.” </li></ul></ul></ul><ul><ul><ul><li>Bob Dolin, CDA release 1 </li></ul></ul></ul>Is Access Control ‘out of scope’ for the CDA?
  18. 20. The Proposal from Finland Itala and Virtahen ‘Seamless care and the CDA’ <ul><li>“ When certain pre-defined packages are ready for viewing, the original system creates a reference to that package of data……The package of data is defined as a CDA document. When the reference is created, the original system sends a CDA header of the document to the regional system……The entry contains the document id as a pointer to the original system (which)_...keeps a similar list of pointers to those documents it has created.. When the doctor wants to look at the patient data the regional system looks up the entry from the list of pointers…creates a full CDA document and sends it back to the original system.” </li></ul>
  19. 22. checkDocInfo( ) - object operation/method defined for the CDA Header/Access Object to get the meta-data information about the document as part of the matching function required to determine whether there is a match between the document requestor wants and the CDA header stored checkServeTarget( ) - also object operation/method defined for the CDA Header/Access Object to get the patient identified by the requestor for the CDA document required is the target patient for whom the CDA header (in the regional server list) was created for getOriginatingOrgNetID( ) is an operation/method defined for the the CDA Header/Access Object stored on the regional server. This operation will interrogate the CDA Header List stored in the regional server which should hold the Network ID/address of where the original attestable CDA data/documents are held - the Provider Organisation that created and stores the data/document, or the regional server itself.
  20. 23. Access process proposal <ul><li>An 'Access-Lock' Object is created when the clinician creates attestable clinical data and specifies the data's access right level(s). </li></ul><ul><li>This can be done at the clinical interview, directly on the instructions of the patient, although it is likely that ‘default’ access behaviour will apply in most implementations unless specifically countermanded. </li></ul><ul><li>The ‘lock’ object is stored with the data on the provider system </li></ul><ul><li>. </li></ul>
  21. 24. matchReq&DataAccessRole( ) - an object operation defined for the 'Access Lock' object to detemine whether the 'Role for Access' supplied by the 'Request Object' is of the legal role for access the data for which the 'Role for Access' attribute has been defined.
  22. 25. Access Process Proposal <ul><li>The CDA header is ‘detachable’ as in the suggestion from Finland, </li></ul><ul><li>The body can be ‘virtual’, that is only the header need actually be created at the time of data creation, which can be on any system whatsoever </li></ul><ul><li>A copy of the CDA header plus referent to the data is also sent to the regional server. </li></ul>
  23. 26. We suggest four stages for a universal access control mechanism to accompany the CDA as the universal ‘attestable unit’ of healthcare.
  24. 27. Stage One <ul><ul><ul><li>There is a ‘Login’ stage to gain access to the regional network, which includes presentation of a digital certificate with ‘role’ and ‘ID’ information. </li></ul></ul></ul>
  25. 28. Stage Two <ul><ul><ul><li>A request/search object is constructed which contains this user role information, along with the ‘id’ of the target patient, and an ‘index’ of the information required. </li></ul></ul></ul><ul><ul><ul><li>It also contains the public key of the requestor’s institution. It is used to search the ‘CDA header lists’ on the network of regional servers. </li></ul></ul></ul>
  26. 30. Stage Three <ul><ul><ul><li>When a match is made, including the access lock role match, the searcher gets access to the referent of the stored or virtual CDA. </li></ul></ul></ul><ul><ul><ul><li>The digital signature/certificate and public key certificate enclosed within the (SOAP) envelope authenticate the identity of the requestor and the public key that he/she sends with the request. </li></ul></ul></ul>
  27. 31. Regional Server data store List of CDA Headers (or Access Objects) Provider Server data store Match found Locates CDA document source Attestable Unit Document information Encounter data Service actors Service targets Clinical digest Attestable Unit Document information Encounter data Service actors Service targets Clinical digest Which may be on its own data store
  28. 32. Regional Server data store List of CDA Headers (or Access Objects) Provider Server data store Locates CDA document source Encrpytion key transfer Attestable Unit Document information Encounter data Service actors Service targets Clinical digest Access approved
  29. 33. Stage Four <ul><ul><ul><li>The holder of the CDA data/document can then use the public key from the sender to encrypt the data/document, which can then only be decrypted by the requestor, ensuring confidentiality and integrity of the data transmitted across the Internet. </li></ul></ul></ul>
  30. 34. SSL SOAP security SOAP Envelope Digital signature Public key certificate SOAP encryption Role-base access control SSL SSL Regional (SOAP) Server Data store Regional (SOAP) Server Data store Requestor Data store Provider (originating Organization) Secure Socket Layer (SSL) Security Cleint/Server authentication Supporting SOAP encryption 2 CDA request in SOAP envelope 3 Route request to neigbour if necessary 3 Get complete CDA from Provider if request and access role matched 1 Request to neighbour server CDA Document in SOAP Envelop SOAP Security
  31. 35. If the regional server that received the request for the CDA document cannot find a match on its CDA header list, it will pass on the request to a neighboring server, which will pass onto the next ...... until a match is found and the procedure of the previous paragraph will be performed, or it returns a ‘no find’ result. NB: This model assumes continuous ‘on line’ availability of data from providers.
  32. 36. CDA Confidentiality Attributes <ul><li>The CDA does provide confidentiality attributes (or ‘hooks’ as Liora Alschuler called them) to aid application systems in managing access to sensitive data. Confidentiality status may apply to the entire document or to specified segments of the document. Some confidentiality levels have been demarcated, along with their ‘roles’. </li></ul>
  33. 38. Role Words <ul><li>Role words in a language, like most other words, are language specific. </li></ul><ul><li>Is ‘Verstehen’ the same as ‘Understanding’? </li></ul><ul><li>Is ‘Spirituel’ the same as ‘Spiritual’? </li></ul><ul><li>Most role words simply do NOT translate </li></ul><ul><li>The ‘Chess’ analogy for language: Saussure </li></ul><ul><li>The concept of ‘autopoiesis’ : Varela </li></ul>
  34. 39. Roles as self defining ‘autopoietic’ sets
  35. 40. Cross border role mapping <ul><li>Dynamic, like roles themselves </li></ul><ul><li>complex, difficult, somewhat arbitrary </li></ul><ul><li>achievable however, </li></ul><ul><li>This kind of activity already exists e.g. </li></ul><ul><li>The Ontology Interface Language (OIL) for the ‘semantic web’ </li></ul><ul><li>The CDA design itself should be ‘empty’ of cultural definitions. </li></ul>
  36. 41. Provider Regional Network Requestor Retrieving CDAs from the network…….they might cling to the search sticks, like termites!
  37. 42. The ‘end dream….’ <ul><li>A single pervasive device, the CDA </li></ul><ul><li>A simple shared access process </li></ul><ul><li>endlessly customizable, </li></ul><ul><li>can act as a stand alone, a component, an EHR extract (GEHR/CEN), </li></ul><ul><li>a ‘fix for now’, a stage in a global evolution </li></ul><ul><li>Just let it go, release it in global healthcare </li></ul><ul><li>facilitate the emergence of ‘implicate’ order </li></ul><ul><li>Let’s give Gaia an immune system, maybe she will heal... </li></ul>
  38. 43. Thank you for your attention Many thanks to the organizers of this wonderful event

×