SlideShare a Scribd company logo
Healthcare Exchange 
Interoperability 
Standards Overview 
and Solution Proposal 
Tomislav Milinovic
National Strategy 
http://www.who.int/goe/policies/countries/hrv/en/
Exchange of Health Information 
• The vision for exchange of health information is to 
electronically move health information among disparate 
health care information systems while maintaining the 
meaning of the information exchanged. 
• The goal is to facilitate access to and retrieval of health 
data in order to: 
– improve health care quality 
– increase patient safety 
– reduce health care costs 
– improve public health
e-Health Interoperability 
• Interoperability of Electronic Health Records (EHR) systems 
means the ability of two or more EHR systems or components 
of EHR systems to exchange information electronically, 
securely, accurately and verifiably, when and where needed.
Access ControlModel 
• An access control system designed to operate in the healthcare scenario 
should: 
– be flexible and extensible 
– should protect the privacy of the patients, 
– not allow the exchange of identity data, in compliance with government legislation 
• The majority of the electronic health record (EHR) systems uses the RBAC 
model. It is considered to be particularly well-suited to health care systems. 
Journal of Biomedical Informatics 46 (2013) 541–562 
• In RBAC, a precise semantic of roles must be defined among organizations, 
which can be unrealistic in service-oriented architectures, where no 
agreement on the capabilities assigned to roles can be achieved in advance 
by the different involved entities.
Security/Privacy Considerations 
• HL7 v3 does not suggest any data security mechanism, but 
specifies data formats and data fields in messages that can carry 
such information within a message for its security. 
• HL7 is evolving a RBAC specification for role and permissions-based 
access control over health information of patients stored 
in EHR. 
• RBAC specification covers authorization and access control 
aspects of security. In a distributed healthcare system 
implementation, such a policy framework comes as a necessary 
add-on over a message exchange. 
• For example, a patient is being seen by a physician for a diabetic 
consultation. The physician needs access to the patients’ medical 
history and results from tests which are being performed during 
the visit (Physician with Review Documentation privileges)
RBAC 
• HL7 V3 Standard: Role-Based Access Control Healthcare Permission Catalog, Release 2 
– Core RBAC elements (users, roles, objects, operations, and permissions) are transferred into 
operation and object definitions that can be adopted. 
– Introduces normative language to the HL7 permission vocabulary in constructing permissions 
{operation, object} pairs, for example, Permission Name: New Laboratory Order {CREATE, 
Laboratory Order} 
– should be considered as a baseline for interoperability between different policy domains. 
• ISO/TS 22600-2:2006 Health informatics — Privilege management and access control 
– Defines RBAC control schema based on harmonized functional and structural roles 
– The American ASTM E1986–98 standard has defined an American list of roles. ISO DTS 21298 
defines a similar set of structural and functional roles which are referred to in the International 
Labour Organisation . 
• HL7 Version 3 Standard: Security and Privacy Ontology, Release 1 
– Individual request for permission to perform an operation on an object must be logically 
consistent with the ontology. 
For example, the PhysicianFunctionalRole role has permission to create order entries, including 
laboratory orders, etc. On requesting permission for the actor of that role to create an account 
receivable, the reasoner will report an inconsistency.
ABAC 
• A key advantage to the Attribute-based Access Control (ABAC) 
model is that there is no need for the requester to be known in 
advance to the system or resource to which access is sought. 
• As long as the attributes that the requestor supplies meet the 
criteria for gaining entry, access will be granted. 
• Ability to determine access without the need for a predefined list of 
individuals that are approved for access is critical in large 
enterprises where the people may join or leave the organization 
arbitrarily.
ABAC vs. RBAC 
• Gartner Identity and Access Summit, Nov 2013 
– By 2020, 70% of all businesses will use ABAC as the dominant mechanism to protect 
critical assets, up from 5% today 
• NIST Special Publication 800-162: 
Guide to ABAC Definition and Considerations 
– RBAC does not easily support multi-factor decisions (for example, decisions 
dependent on physical location, and specialized training such as for Health Insurance 
Portability and Accountability Act (HIPAA) records access; recent training on HIPAA 
data protection may be a prerequisite to view medical records.)
PBAC 
• A resource is governed by a document that exactly specifies what 
subject credentials and requirements must be fulfilled in order to 
obtain access. 
• PBAC can be said to be a harmonization and standardization of the 
ABAC model at an enterprise level in support of specific governance 
objectives (regulation and legislation). 
• PBAC is by now the de-facto standard model for enforcing access 
control policies in service-oriented architectures.
XACML 
• A widely used implementation of PBAC is given by eXtensible 
Access Control Language (XACML). It defines a language for the 
definition of policies and access requests and a complete workflow 
to achieve policy enforcement 
• EU Project epSOS uses XACML as a policy language for expressing 
access control for sensitive data such as patients healthcare 
information. 
• Core and hierarchical role based access control (RBAC) profile of 
XACML v2.0 (OASIS Standard, 1 February 2005) defines a profile for 
the use of XACML in expressing policies that use “core” and 
“hierarchical” RBAC
Request 
<Request xmlns="urn:oasis:names:tc:xacml:2.0:context:schema:os" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="urn:oasis:names:tc:xacml:2.0:context:schema:os 
access_control-xacml-2.0-context-schema-os.xsd"> 
<Subject> 
<Attribute AttributeId="urn:oasis:names:tc:xacml:1.0:subject:subject-id" 
DataType="http://www.w3.org/2001/XMLSchema#string"> 
<AttributeValue>Julius Hibbert</AttributeValue> 
</Attribute> 
</Subject> 
<Resource> 
<Attribute AttributeId="urn:oasis:names:tc:xacml:1.0:resource:resource-id" 
DataType="http://www.w3.org/2001/XMLSchema#anyURI"> 
<AttributeValue>http://medico.com/record/patient/BartSimpson</AttributeValue> 
</Attribute> 
</Resource> 
<Action> 
<Attribute AttributeId="urn:oasis:names:tc:xacml:1.0:action:action-id" 
DataType="http://www.w3.org/2001/XMLSchema#string"> 
<AttributeValue>read</AttributeValue> 
</Attribute> 
</Action> 
<Environment /> 
</Request>
Response 
<Response xmlns="urn:oasis:names:tc:xacml:2.0:context:schema:os" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="urn:oasis:names:tc:xacml:2.0:context:schema:os 
access_control-xacml-2.0-context-schema-os.xsd"> 
<Result> 
<Decision>Permit</Decision> 
<Status> 
<StatusCode Value="urn:oasis:names:tc:xacml:1.0:status:ok" /> 
</Status> 
</Result> 
</Response>
Cross-Enterprise Security and Privacy Authorization 
(XSPA) Profile of XACML v2.0 for Healthcare v1.0 
OASIS Standard, 1 November 2009, http://docs.oasis-open.org/xacml/xspa/v1.0/saml-xspa-1.0.html 
This profile specifies the use of XACML 2.0 to promote interoperability within the healthcare 
community by providing common semantics and vocabularies for interoperable policy 
request/response, policy lifecycle, and policy enforcement. 
Attribute ID* Identifier Type Valid Values 
subject:subject-id urn:oasis:names:tc:xacml:1.0:subject:subject-id String Is the name of the user as 
required by Health Insurance 
Portability and Accountability Act 
(HIPAA) Privacy Disclosure 
Accounting. The name will be 
typed as a string and in plain text. 
subject:organization urn:oasis:names:tc:xspa:1.0:subject:organization String Organization the requesting user 
belongs to as required by Health 
Insurance Portability and 
Accountability Act (HIPAA) 
Privacy Disclosure 
Accounting. The name will be 
typed as a string and in plain text. 
subject:organization-id urn:oasis:names:tc:xspa:1.0:subject:organization-id anyURI Unique identifier of the 
consuming organization and/or 
facility 
subject:hl7:permission urn:oasis:names:tc:xspa:1.0:subject:hl7:permission String Refer to [HL7-PERM] and its OID 
representation. 
subject:role urn:oasis:names:tc:xacml:2.0:subject:role String Structural Role refer to [ASTM 
E1986-98 (2005)] and its OID 
representation. 
subject:purposeofuse urn:oasis:names:tc:xspa:1,0:subject:purposeofuse String TREATMENT, PAYMENT, 
OPERATIONS, EMERGENCY, 
MARKETING, RESEARCH, 
REQUEST, PUBLICHEALTH 
resource:resource-id urn:oasis:names:tc:xacml:1.0:resource:resource-id String Unique identifier of the resource 
defined by and controlled by the 
servicing organization. In 
healthcare this is the patient 
unique identifier. 
resource:hl7:type urn:oasis:names:tc:xspa:1.0:resource:hl7:type String For minimum interoperability set 
of objects and supporting actions 
refer to [HL7-PERM] and their 
OID representations. 
resource:org:permission urn:oasis:names:tc:xspa:1.0:resource:org:hl7:permi 
ssions 
String Refer to [HL7-PERM] and its OID 
representation. This attribute 
holds permissions required by 
the servicing organization to 
grant access to a specific 
resource. 
SOAP SAML XACML Request wrapper 
The request message contains three protocol layers: 
• soapenv: A SOAP Envelope contains a SOAP Body. 
• xacml-samlp: SAML protocol layer, which is enabled by the 
XACML extension to the SAML protocol 
• xacml-context: is the XACML request/response layer 
The response message above contains three protocol layers: 
• soapenv: is the SOAP layer. A SOAP Envelope contains a 
SOAP Body. 
• samlp: in the response case the xacml extension is lower in 
the samlp: protocol. In particular, samlp: requires a 
saml:Assertion, which in turn includes a saml:Statement. It is 
within the saml:Statement that the xacml extension occurs 
and is referred to as xacml-saml: because it extends the 
saml:Assertion/saml:Statement with the 
XACMLAuthzDecisionStatementType. 
• xacml-context: is the XACML request/response layer
Integrating the Healthcare Enterprise 
(IHE) Initiative 
• Designed to stimulate the integration of the healthcare information systems 
• Support the use of existing standards, e.g., HL7, ASTM, DICOM, ISO, IETF, OASIS 
rather than to define a new standards 
• IHE Europe (IHE-EUR) is supported by the European Institute for health Records 
(EuroRec). 
• IHE IT Infrastructure Technical Framework 
– Volume 1 (ITI TF-1): Integration Profiles 
• Cross-Enterprise Document Sharing (XDS), sharing clinical records within an XDS Affinity Domain 
• Cross-Enterprise User Assertion Profile (XUA), communicate claims about the identity 
• Basic Patient Privacy Consents (BPPC) 
• Patient Identifier Cross-referencing HL7 V3 (PIXV3), correlate a patient information from 
multiple sources 
• Cross-Community Access (XCA), query and retrieve patient relevant medical data held across 
multiple domains
IHE IT-Infrastructure Access Control 
White Paper 
• Inflexibilities of RBAC in healthcare 
– people often switch among multiple roles 
– access rights vary depending on the state of the patient or the “operational mode” of 
the organization (e.g., nightshift, disaster management) 
• Policy Based Access Control 
– A policy is a set of rules, which control the security and privacy behavior of a given 
system. 
– Policy activation requires that attribute values have to be available. 
This can either be realized by: 
• the requestor, who includes them with the request message 
• the processing party who retrieves them on demand from a policy information 
point 
• XACML as candidate for policy encoding
Policy Attributes and Attribute Sources
Oracle Entitlement Server 
• A fine grained authorization solution 
– While OAG and OAM has authorization capabilities, in this field OES offers a 
much richer model. 
• OES supports ABAC(XACML), RBAC (NIST RBAC), ERBAC (Enterprise 
RBAC) and JAAS policy models. 
• Oracle API Gateway is natively integrated with OES - this requires 
no changes to the application code. 
– Oracle API Gateway can use OES to manage authorization for Web Services. 
The integration hook between OAG and OES is the OES 11g Authorization 
filter
Oracle Entitlement Server 
• API Gateway ‘s XACML PEP filter enables you to configure the API Gateway to act as a PEP. 
The API Gateway intercepts a user request to a resource, and enforces the decision from the 
Policy Decision Point (PDP). 
• When Oracle Entitlements Server is deployed, a Policy Decision Point (PDP) receives a 
request for authorization, evaluates it based on applicable policies, reaches a decision and 
returns the decision to the Policy Enforcement Point (PEP).
Healthcare Exchange Interoperability

More Related Content

What's hot

Informatics Standards And Interoperability20090325
Informatics Standards And Interoperability20090325Informatics Standards And Interoperability20090325
Informatics Standards And Interoperability20090325
Abdul-Malik Shakir
 
City of hope research informatics common data elements
City of hope research informatics common data elementsCity of hope research informatics common data elements
City of hope research informatics common data elements
Abdul-Malik Shakir
 
Addressing the Healthcare Connectivity Challenge
Addressing the Healthcare Connectivity ChallengeAddressing the Healthcare Connectivity Challenge
Addressing the Healthcare Connectivity Challenge
Todd Winey
 
Health Care EA Presentation
Health Care EA PresentationHealth Care EA Presentation
Health Care EA Presentation
Bill Wimsatt
 
SOA enabled next generatione EMR/EHR
SOA enabled next generatione EMR/EHRSOA enabled next generatione EMR/EHR
SOA enabled next generatione EMR/EHR
Victor Chai
 
Introduction to hl7 v2
Introduction to hl7 v2Introduction to hl7 v2
Introduction to hl7 v2
Abdul-Malik Shakir
 
Blockchain Applications in Healthcare
Blockchain Applications in HealthcareBlockchain Applications in Healthcare
Blockchain Applications in Healthcare
CitiusTech
 
Healthcare Information Technology: IBM Health Integration Framework
Healthcare Information Technology: IBM Health Integration FrameworkHealthcare Information Technology: IBM Health Integration Framework
Healthcare Information Technology: IBM Health Integration Framework
IBM HealthCare
 
Kareo Award Write Up
Kareo Award Write UpKareo Award Write Up
Kareo Award Write Up
Claudia Toscano
 
Improving Efficiency and Outcomes in Healthcare using Internet of Things
Improving Efficiency and Outcomes in Healthcare using Internet of ThingsImproving Efficiency and Outcomes in Healthcare using Internet of Things
Improving Efficiency and Outcomes in Healthcare using Internet of Things
CitiusTech
 
Cscchealthcare110512
Cscchealthcare110512Cscchealthcare110512
Cscchealthcare110512Accenture
 
Physician Practices: Are Application Service Providers Right ...
Physician Practices: Are Application Service Providers Right ...Physician Practices: Are Application Service Providers Right ...
Physician Practices: Are Application Service Providers Right ...webhostingguy
 
Healthcare Software Ecosystem
Healthcare Software EcosystemHealthcare Software Ecosystem
Healthcare Software Ecosystem
Aptuso Ltd.
 
Emerging Standards and the Disruption of HIE 1.0
Emerging Standards and the Disruption of HIE 1.0Emerging Standards and the Disruption of HIE 1.0
Emerging Standards and the Disruption of HIE 1.0
Jitin Asnaani
 
Ibm and zato health
Ibm and zato healthIbm and zato health
Ibm and zato health
Diego Rodriguez
 
Introduction to cda may 2019 montreal
Introduction to cda may 2019 montrealIntroduction to cda may 2019 montreal
Introduction to cda may 2019 montreal
Abdul-Malik Shakir
 
Fhir meetup at the scale la (abdul malik.shakir)
Fhir meetup at the scale la (abdul malik.shakir)Fhir meetup at the scale la (abdul malik.shakir)
Fhir meetup at the scale la (abdul malik.shakir)
Abdul-Malik Shakir
 
Cloud Disrupting Healthcare
Cloud Disrupting HealthcareCloud Disrupting Healthcare
Cloud Disrupting Healthcare
kairostech
 
The hitchhiker's guide to health level seven
The hitchhiker's guide to health level sevenThe hitchhiker's guide to health level seven
The hitchhiker's guide to health level seven
Abdul-Malik Shakir
 

What's hot (19)

Informatics Standards And Interoperability20090325
Informatics Standards And Interoperability20090325Informatics Standards And Interoperability20090325
Informatics Standards And Interoperability20090325
 
City of hope research informatics common data elements
City of hope research informatics common data elementsCity of hope research informatics common data elements
City of hope research informatics common data elements
 
Addressing the Healthcare Connectivity Challenge
Addressing the Healthcare Connectivity ChallengeAddressing the Healthcare Connectivity Challenge
Addressing the Healthcare Connectivity Challenge
 
Health Care EA Presentation
Health Care EA PresentationHealth Care EA Presentation
Health Care EA Presentation
 
SOA enabled next generatione EMR/EHR
SOA enabled next generatione EMR/EHRSOA enabled next generatione EMR/EHR
SOA enabled next generatione EMR/EHR
 
Introduction to hl7 v2
Introduction to hl7 v2Introduction to hl7 v2
Introduction to hl7 v2
 
Blockchain Applications in Healthcare
Blockchain Applications in HealthcareBlockchain Applications in Healthcare
Blockchain Applications in Healthcare
 
Healthcare Information Technology: IBM Health Integration Framework
Healthcare Information Technology: IBM Health Integration FrameworkHealthcare Information Technology: IBM Health Integration Framework
Healthcare Information Technology: IBM Health Integration Framework
 
Kareo Award Write Up
Kareo Award Write UpKareo Award Write Up
Kareo Award Write Up
 
Improving Efficiency and Outcomes in Healthcare using Internet of Things
Improving Efficiency and Outcomes in Healthcare using Internet of ThingsImproving Efficiency and Outcomes in Healthcare using Internet of Things
Improving Efficiency and Outcomes in Healthcare using Internet of Things
 
Cscchealthcare110512
Cscchealthcare110512Cscchealthcare110512
Cscchealthcare110512
 
Physician Practices: Are Application Service Providers Right ...
Physician Practices: Are Application Service Providers Right ...Physician Practices: Are Application Service Providers Right ...
Physician Practices: Are Application Service Providers Right ...
 
Healthcare Software Ecosystem
Healthcare Software EcosystemHealthcare Software Ecosystem
Healthcare Software Ecosystem
 
Emerging Standards and the Disruption of HIE 1.0
Emerging Standards and the Disruption of HIE 1.0Emerging Standards and the Disruption of HIE 1.0
Emerging Standards and the Disruption of HIE 1.0
 
Ibm and zato health
Ibm and zato healthIbm and zato health
Ibm and zato health
 
Introduction to cda may 2019 montreal
Introduction to cda may 2019 montrealIntroduction to cda may 2019 montreal
Introduction to cda may 2019 montreal
 
Fhir meetup at the scale la (abdul malik.shakir)
Fhir meetup at the scale la (abdul malik.shakir)Fhir meetup at the scale la (abdul malik.shakir)
Fhir meetup at the scale la (abdul malik.shakir)
 
Cloud Disrupting Healthcare
Cloud Disrupting HealthcareCloud Disrupting Healthcare
Cloud Disrupting Healthcare
 
The hitchhiker's guide to health level seven
The hitchhiker's guide to health level sevenThe hitchhiker's guide to health level seven
The hitchhiker's guide to health level seven
 

Viewers also liked

Understanding clinical data exchange and cda (hl7 201)
Understanding clinical data exchange and cda (hl7 201)Understanding clinical data exchange and cda (hl7 201)
Understanding clinical data exchange and cda (hl7 201)
Edifecs Inc
 
iHT2 Health IT Summit Atlanta 2013, Michael Matthews, Chief Executive Officer...
iHT2 Health IT Summit Atlanta 2013, Michael Matthews, Chief Executive Officer...iHT2 Health IT Summit Atlanta 2013, Michael Matthews, Chief Executive Officer...
iHT2 Health IT Summit Atlanta 2013, Michael Matthews, Chief Executive Officer...
Health IT Conference – iHT2
 
HIT Policy Update on Health Information Exchange
HIT Policy Update on Health Information ExchangeHIT Policy Update on Health Information Exchange
HIT Policy Update on Health Information Exchange
Brian Ahier
 
Meet Your Interoperability Goals and Realize Your Vision
Meet Your Interoperability Goals and Realize Your VisionMeet Your Interoperability Goals and Realize Your Vision
Meet Your Interoperability Goals and Realize Your Vision
Iatric Systems
 
Semantic Interoperability in Health Information Exchange
Semantic Interoperability in Health Information ExchangeSemantic Interoperability in Health Information Exchange
Semantic Interoperability in Health Information Exchange
Tomasz Adamusiak
 
ONC – CMS Principles and Strategy for Accelerating Health Information Exch...
ONC – CMS  Principles and Strategy for  Accelerating Health Information  Exch...ONC – CMS  Principles and Strategy for  Accelerating Health Information  Exch...
ONC – CMS Principles and Strategy for Accelerating Health Information Exch...
Brian Ahier
 
Health Information Exchange Strategy
Health Information Exchange Strategy Health Information Exchange Strategy
Health Information Exchange Strategy
Brian Ahier
 
A profit maximization scheme with guaranteed
A profit maximization scheme with guaranteedA profit maximization scheme with guaranteed
A profit maximization scheme with guaranteed
nexgentech15
 
Health Care Information Exchange Strategy & Roadmap
Health Care Information Exchange Strategy & RoadmapHealth Care Information Exchange Strategy & Roadmap
Health Care Information Exchange Strategy & Roadmap
pmulrooney
 
Generation of cda xml schema from dicom images using hl7 standard 2
Generation of cda xml schema from dicom images using hl7 standard 2Generation of cda xml schema from dicom images using hl7 standard 2
Generation of cda xml schema from dicom images using hl7 standard 2IAEME Publication
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
Student
 
SAP Hana Overview
SAP Hana OverviewSAP Hana Overview
SAP Hana Overview
Tomislav Milinović
 
Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...
ieeepondy
 
Duplicate detection
Duplicate detectionDuplicate detection
Duplicate detectionjonecx
 
A study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanismsA study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanisms
eSAT Journals
 
SecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the Clouds
Nexgen Technology
 
HL7 & Health Information Exchange in Thailand
HL7 & Health Information Exchange in ThailandHL7 & Health Information Exchange in Thailand
HL7 & Health Information Exchange in ThailandNawanan Theera-Ampornpunt
 
Health Information Exchange (HIE)
Health Information Exchange (HIE)Health Information Exchange (HIE)
Health Information Exchange (HIE)
Greenway Health
 
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted CloudsSecure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
EUBrasilCloudFORUM .
 

Viewers also liked (20)

Understanding clinical data exchange and cda (hl7 201)
Understanding clinical data exchange and cda (hl7 201)Understanding clinical data exchange and cda (hl7 201)
Understanding clinical data exchange and cda (hl7 201)
 
The cloud 7
The cloud 7The cloud 7
The cloud 7
 
iHT2 Health IT Summit Atlanta 2013, Michael Matthews, Chief Executive Officer...
iHT2 Health IT Summit Atlanta 2013, Michael Matthews, Chief Executive Officer...iHT2 Health IT Summit Atlanta 2013, Michael Matthews, Chief Executive Officer...
iHT2 Health IT Summit Atlanta 2013, Michael Matthews, Chief Executive Officer...
 
HIT Policy Update on Health Information Exchange
HIT Policy Update on Health Information ExchangeHIT Policy Update on Health Information Exchange
HIT Policy Update on Health Information Exchange
 
Meet Your Interoperability Goals and Realize Your Vision
Meet Your Interoperability Goals and Realize Your VisionMeet Your Interoperability Goals and Realize Your Vision
Meet Your Interoperability Goals and Realize Your Vision
 
Semantic Interoperability in Health Information Exchange
Semantic Interoperability in Health Information ExchangeSemantic Interoperability in Health Information Exchange
Semantic Interoperability in Health Information Exchange
 
ONC – CMS Principles and Strategy for Accelerating Health Information Exch...
ONC – CMS  Principles and Strategy for  Accelerating Health Information  Exch...ONC – CMS  Principles and Strategy for  Accelerating Health Information  Exch...
ONC – CMS Principles and Strategy for Accelerating Health Information Exch...
 
Health Information Exchange Strategy
Health Information Exchange Strategy Health Information Exchange Strategy
Health Information Exchange Strategy
 
A profit maximization scheme with guaranteed
A profit maximization scheme with guaranteedA profit maximization scheme with guaranteed
A profit maximization scheme with guaranteed
 
Health Care Information Exchange Strategy & Roadmap
Health Care Information Exchange Strategy & RoadmapHealth Care Information Exchange Strategy & Roadmap
Health Care Information Exchange Strategy & Roadmap
 
Generation of cda xml schema from dicom images using hl7 standard 2
Generation of cda xml schema from dicom images using hl7 standard 2Generation of cda xml schema from dicom images using hl7 standard 2
Generation of cda xml schema from dicom images using hl7 standard 2
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
 
SAP Hana Overview
SAP Hana OverviewSAP Hana Overview
SAP Hana Overview
 
Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...
 
Duplicate detection
Duplicate detectionDuplicate detection
Duplicate detection
 
A study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanismsA study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanisms
 
SecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the Clouds
 
HL7 & Health Information Exchange in Thailand
HL7 & Health Information Exchange in ThailandHL7 & Health Information Exchange in Thailand
HL7 & Health Information Exchange in Thailand
 
Health Information Exchange (HIE)
Health Information Exchange (HIE)Health Information Exchange (HIE)
Health Information Exchange (HIE)
 
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted CloudsSecure Cloud - Secure Big Data Processing in Untrusted Clouds
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
 

Similar to Healthcare Exchange Interoperability

International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES) International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
APHL/CDC Presentation to Vietnamese Health Officials and Stakeholders
APHL/CDC Presentation to Vietnamese Health Officials and StakeholdersAPHL/CDC Presentation to Vietnamese Health Officials and Stakeholders
APHL/CDC Presentation to Vietnamese Health Officials and Stakeholders
Eduardo Gonzalez Loumiet, MBA, PMP, CPHIMS
 
Kg3617691773
Kg3617691773Kg3617691773
Kg3617691773
IJERA Editor
 
IRJET- A Review On - Controlchain: Access Control using Blockchain
IRJET- A Review On - Controlchain: Access Control using BlockchainIRJET- A Review On - Controlchain: Access Control using Blockchain
IRJET- A Review On - Controlchain: Access Control using Blockchain
IRJET Journal
 
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
IRJET Journal
 
Chapter 12 Page 209Discussion Questions 2. How does a d.docx
Chapter 12 Page 209Discussion Questions    2. How does a d.docxChapter 12 Page 209Discussion Questions    2. How does a d.docx
Chapter 12 Page 209Discussion Questions 2. How does a d.docx
cravennichole326
 
Project 1Write 400 words that respond to the following questio.docx
Project 1Write 400 words that respond to the following questio.docxProject 1Write 400 words that respond to the following questio.docx
Project 1Write 400 words that respond to the following questio.docx
briancrawford30935
 
Comp8 unit3 lecture_slides
Comp8 unit3 lecture_slidesComp8 unit3 lecture_slides
Comp8 unit3 lecture_slides
CMDLMS
 
Interoperability Between Healthcare Applications
Interoperability Between Healthcare ApplicationsInteroperability Between Healthcare Applications
Interoperability Between Healthcare ApplicationsJohn Gillson
 
Hl7 & FHIR
Hl7 & FHIRHl7 & FHIR
Working with Health IT Systems is available under a Creative C.docx
Working with Health IT Systems is available under a Creative C.docxWorking with Health IT Systems is available under a Creative C.docx
Working with Health IT Systems is available under a Creative C.docx
helzerpatrina
 
Grid And Healthcare For IOM July 2009
Grid And Healthcare For IOM July 2009Grid And Healthcare For IOM July 2009
Grid And Healthcare For IOM July 2009
Ian Foster
 
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
Shahid Shah
 
Database Security Assessment Transcript You are a contracting office.docx
Database Security Assessment Transcript You are a contracting office.docxDatabase Security Assessment Transcript You are a contracting office.docx
Database Security Assessment Transcript You are a contracting office.docx
whittemorelucilla
 
Ibrahem
IbrahemIbrahem
Ibrahem
BarojReal
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
Zara Nawaz
 
CYBERLAWCompetency 423.1.5 Regulatory Requirements and Stan.docx
CYBERLAWCompetency 423.1.5 Regulatory Requirements and Stan.docxCYBERLAWCompetency 423.1.5 Regulatory Requirements and Stan.docx
CYBERLAWCompetency 423.1.5 Regulatory Requirements and Stan.docx
theodorelove43763
 
Nick Radov, Payer/Provider - Interoperability & HL7 Da Vinci Project.
Nick Radov, Payer/Provider - Interoperability & HL7 Da Vinci Project.Nick Radov, Payer/Provider - Interoperability & HL7 Da Vinci Project.
Nick Radov, Payer/Provider - Interoperability & HL7 Da Vinci Project.
HealthDev
 
Advance database management project
Advance database management projectAdvance database management project
Advance database management projectNilesh Padwal
 
openEHR China Localization working group
openEHR China Localization working groupopenEHR China Localization working group
openEHR China Localization working group
xudong_lu
 

Similar to Healthcare Exchange Interoperability (20)

International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES) International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
APHL/CDC Presentation to Vietnamese Health Officials and Stakeholders
APHL/CDC Presentation to Vietnamese Health Officials and StakeholdersAPHL/CDC Presentation to Vietnamese Health Officials and Stakeholders
APHL/CDC Presentation to Vietnamese Health Officials and Stakeholders
 
Kg3617691773
Kg3617691773Kg3617691773
Kg3617691773
 
IRJET- A Review On - Controlchain: Access Control using Blockchain
IRJET- A Review On - Controlchain: Access Control using BlockchainIRJET- A Review On - Controlchain: Access Control using Blockchain
IRJET- A Review On - Controlchain: Access Control using Blockchain
 
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
 
Chapter 12 Page 209Discussion Questions 2. How does a d.docx
Chapter 12 Page 209Discussion Questions    2. How does a d.docxChapter 12 Page 209Discussion Questions    2. How does a d.docx
Chapter 12 Page 209Discussion Questions 2. How does a d.docx
 
Project 1Write 400 words that respond to the following questio.docx
Project 1Write 400 words that respond to the following questio.docxProject 1Write 400 words that respond to the following questio.docx
Project 1Write 400 words that respond to the following questio.docx
 
Comp8 unit3 lecture_slides
Comp8 unit3 lecture_slidesComp8 unit3 lecture_slides
Comp8 unit3 lecture_slides
 
Interoperability Between Healthcare Applications
Interoperability Between Healthcare ApplicationsInteroperability Between Healthcare Applications
Interoperability Between Healthcare Applications
 
Hl7 & FHIR
Hl7 & FHIRHl7 & FHIR
Hl7 & FHIR
 
Working with Health IT Systems is available under a Creative C.docx
Working with Health IT Systems is available under a Creative C.docxWorking with Health IT Systems is available under a Creative C.docx
Working with Health IT Systems is available under a Creative C.docx
 
Grid And Healthcare For IOM July 2009
Grid And Healthcare For IOM July 2009Grid And Healthcare For IOM July 2009
Grid And Healthcare For IOM July 2009
 
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
 
Database Security Assessment Transcript You are a contracting office.docx
Database Security Assessment Transcript You are a contracting office.docxDatabase Security Assessment Transcript You are a contracting office.docx
Database Security Assessment Transcript You are a contracting office.docx
 
Ibrahem
IbrahemIbrahem
Ibrahem
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
 
CYBERLAWCompetency 423.1.5 Regulatory Requirements and Stan.docx
CYBERLAWCompetency 423.1.5 Regulatory Requirements and Stan.docxCYBERLAWCompetency 423.1.5 Regulatory Requirements and Stan.docx
CYBERLAWCompetency 423.1.5 Regulatory Requirements and Stan.docx
 
Nick Radov, Payer/Provider - Interoperability & HL7 Da Vinci Project.
Nick Radov, Payer/Provider - Interoperability & HL7 Da Vinci Project.Nick Radov, Payer/Provider - Interoperability & HL7 Da Vinci Project.
Nick Radov, Payer/Provider - Interoperability & HL7 Da Vinci Project.
 
Advance database management project
Advance database management projectAdvance database management project
Advance database management project
 
openEHR China Localization working group
openEHR China Localization working groupopenEHR China Localization working group
openEHR China Localization working group
 

Recently uploaded

Triangles of Neck and Clinical Correlation by Dr. RIG.pptx
Triangles of Neck and Clinical Correlation by Dr. RIG.pptxTriangles of Neck and Clinical Correlation by Dr. RIG.pptx
Triangles of Neck and Clinical Correlation by Dr. RIG.pptx
Dr. Rabia Inam Gandapore
 
micro teaching on communication m.sc nursing.pdf
micro teaching on communication m.sc nursing.pdfmicro teaching on communication m.sc nursing.pdf
micro teaching on communication m.sc nursing.pdf
Anurag Sharma
 
Charaka Samhita Sutra Sthana 9 Chapter khuddakachatuspadadhyaya
Charaka Samhita Sutra Sthana 9 Chapter khuddakachatuspadadhyayaCharaka Samhita Sutra Sthana 9 Chapter khuddakachatuspadadhyaya
Charaka Samhita Sutra Sthana 9 Chapter khuddakachatuspadadhyaya
Dr KHALID B.M
 
The POPPY STUDY (Preconception to post-partum cardiovascular function in prim...
The POPPY STUDY (Preconception to post-partum cardiovascular function in prim...The POPPY STUDY (Preconception to post-partum cardiovascular function in prim...
The POPPY STUDY (Preconception to post-partum cardiovascular function in prim...
Catherine Liao
 
Are There Any Natural Remedies To Treat Syphilis.pdf
Are There Any Natural Remedies To Treat Syphilis.pdfAre There Any Natural Remedies To Treat Syphilis.pdf
Are There Any Natural Remedies To Treat Syphilis.pdf
Little Cross Family Clinic
 
basicmodesofventilation2022-220313203758.pdf
basicmodesofventilation2022-220313203758.pdfbasicmodesofventilation2022-220313203758.pdf
basicmodesofventilation2022-220313203758.pdf
aljamhori teaching hospital
 
Factory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in Stock
Factory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in StockFactory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in Stock
Factory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in Stock
rebeccabio
 
BRACHYTHERAPY OVERVIEW AND APPLICATORS
BRACHYTHERAPY OVERVIEW  AND  APPLICATORSBRACHYTHERAPY OVERVIEW  AND  APPLICATORS
BRACHYTHERAPY OVERVIEW AND APPLICATORS
Krishan Murari
 
The hemodynamic and autonomic determinants of elevated blood pressure in obes...
The hemodynamic and autonomic determinants of elevated blood pressure in obes...The hemodynamic and autonomic determinants of elevated blood pressure in obes...
The hemodynamic and autonomic determinants of elevated blood pressure in obes...
Catherine Liao
 
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
kevinkariuki227
 
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
bkling
 
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model SafeSurat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Savita Shen $i11
 
Evaluation of antidepressant activity of clitoris ternatea in animals
Evaluation of antidepressant activity of clitoris ternatea in animalsEvaluation of antidepressant activity of clitoris ternatea in animals
Evaluation of antidepressant activity of clitoris ternatea in animals
Shweta
 
How to Give Better Lectures: Some Tips for Doctors
How to Give Better Lectures: Some Tips for DoctorsHow to Give Better Lectures: Some Tips for Doctors
How to Give Better Lectures: Some Tips for Doctors
LanceCatedral
 
KDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologistsKDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologists
د.محمود نجيب
 
Flu Vaccine Alert in Bangalore Karnataka
Flu Vaccine Alert in Bangalore KarnatakaFlu Vaccine Alert in Bangalore Karnataka
Flu Vaccine Alert in Bangalore Karnataka
addon Scans
 
The Normal Electrocardiogram - Part I of II
The Normal Electrocardiogram - Part I of IIThe Normal Electrocardiogram - Part I of II
The Normal Electrocardiogram - Part I of II
MedicoseAcademics
 
Physiology of Special Chemical Sensation of Taste
Physiology of Special Chemical Sensation of TastePhysiology of Special Chemical Sensation of Taste
Physiology of Special Chemical Sensation of Taste
MedicoseAcademics
 
Prix Galien International 2024 Forum Program
Prix Galien International 2024 Forum ProgramPrix Galien International 2024 Forum Program
Prix Galien International 2024 Forum Program
Levi Shapiro
 
heat stroke and heat exhaustion in children
heat stroke and heat exhaustion in childrenheat stroke and heat exhaustion in children
heat stroke and heat exhaustion in children
SumeraAhmad5
 

Recently uploaded (20)

Triangles of Neck and Clinical Correlation by Dr. RIG.pptx
Triangles of Neck and Clinical Correlation by Dr. RIG.pptxTriangles of Neck and Clinical Correlation by Dr. RIG.pptx
Triangles of Neck and Clinical Correlation by Dr. RIG.pptx
 
micro teaching on communication m.sc nursing.pdf
micro teaching on communication m.sc nursing.pdfmicro teaching on communication m.sc nursing.pdf
micro teaching on communication m.sc nursing.pdf
 
Charaka Samhita Sutra Sthana 9 Chapter khuddakachatuspadadhyaya
Charaka Samhita Sutra Sthana 9 Chapter khuddakachatuspadadhyayaCharaka Samhita Sutra Sthana 9 Chapter khuddakachatuspadadhyaya
Charaka Samhita Sutra Sthana 9 Chapter khuddakachatuspadadhyaya
 
The POPPY STUDY (Preconception to post-partum cardiovascular function in prim...
The POPPY STUDY (Preconception to post-partum cardiovascular function in prim...The POPPY STUDY (Preconception to post-partum cardiovascular function in prim...
The POPPY STUDY (Preconception to post-partum cardiovascular function in prim...
 
Are There Any Natural Remedies To Treat Syphilis.pdf
Are There Any Natural Remedies To Treat Syphilis.pdfAre There Any Natural Remedies To Treat Syphilis.pdf
Are There Any Natural Remedies To Treat Syphilis.pdf
 
basicmodesofventilation2022-220313203758.pdf
basicmodesofventilation2022-220313203758.pdfbasicmodesofventilation2022-220313203758.pdf
basicmodesofventilation2022-220313203758.pdf
 
Factory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in Stock
Factory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in StockFactory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in Stock
Factory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in Stock
 
BRACHYTHERAPY OVERVIEW AND APPLICATORS
BRACHYTHERAPY OVERVIEW  AND  APPLICATORSBRACHYTHERAPY OVERVIEW  AND  APPLICATORS
BRACHYTHERAPY OVERVIEW AND APPLICATORS
 
The hemodynamic and autonomic determinants of elevated blood pressure in obes...
The hemodynamic and autonomic determinants of elevated blood pressure in obes...The hemodynamic and autonomic determinants of elevated blood pressure in obes...
The hemodynamic and autonomic determinants of elevated blood pressure in obes...
 
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
 
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
 
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model SafeSurat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
 
Evaluation of antidepressant activity of clitoris ternatea in animals
Evaluation of antidepressant activity of clitoris ternatea in animalsEvaluation of antidepressant activity of clitoris ternatea in animals
Evaluation of antidepressant activity of clitoris ternatea in animals
 
How to Give Better Lectures: Some Tips for Doctors
How to Give Better Lectures: Some Tips for DoctorsHow to Give Better Lectures: Some Tips for Doctors
How to Give Better Lectures: Some Tips for Doctors
 
KDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologistsKDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologists
 
Flu Vaccine Alert in Bangalore Karnataka
Flu Vaccine Alert in Bangalore KarnatakaFlu Vaccine Alert in Bangalore Karnataka
Flu Vaccine Alert in Bangalore Karnataka
 
The Normal Electrocardiogram - Part I of II
The Normal Electrocardiogram - Part I of IIThe Normal Electrocardiogram - Part I of II
The Normal Electrocardiogram - Part I of II
 
Physiology of Special Chemical Sensation of Taste
Physiology of Special Chemical Sensation of TastePhysiology of Special Chemical Sensation of Taste
Physiology of Special Chemical Sensation of Taste
 
Prix Galien International 2024 Forum Program
Prix Galien International 2024 Forum ProgramPrix Galien International 2024 Forum Program
Prix Galien International 2024 Forum Program
 
heat stroke and heat exhaustion in children
heat stroke and heat exhaustion in childrenheat stroke and heat exhaustion in children
heat stroke and heat exhaustion in children
 

Healthcare Exchange Interoperability

  • 1. Healthcare Exchange Interoperability Standards Overview and Solution Proposal Tomislav Milinovic
  • 3. Exchange of Health Information • The vision for exchange of health information is to electronically move health information among disparate health care information systems while maintaining the meaning of the information exchanged. • The goal is to facilitate access to and retrieval of health data in order to: – improve health care quality – increase patient safety – reduce health care costs – improve public health
  • 4. e-Health Interoperability • Interoperability of Electronic Health Records (EHR) systems means the ability of two or more EHR systems or components of EHR systems to exchange information electronically, securely, accurately and verifiably, when and where needed.
  • 5. Access ControlModel • An access control system designed to operate in the healthcare scenario should: – be flexible and extensible – should protect the privacy of the patients, – not allow the exchange of identity data, in compliance with government legislation • The majority of the electronic health record (EHR) systems uses the RBAC model. It is considered to be particularly well-suited to health care systems. Journal of Biomedical Informatics 46 (2013) 541–562 • In RBAC, a precise semantic of roles must be defined among organizations, which can be unrealistic in service-oriented architectures, where no agreement on the capabilities assigned to roles can be achieved in advance by the different involved entities.
  • 6. Security/Privacy Considerations • HL7 v3 does not suggest any data security mechanism, but specifies data formats and data fields in messages that can carry such information within a message for its security. • HL7 is evolving a RBAC specification for role and permissions-based access control over health information of patients stored in EHR. • RBAC specification covers authorization and access control aspects of security. In a distributed healthcare system implementation, such a policy framework comes as a necessary add-on over a message exchange. • For example, a patient is being seen by a physician for a diabetic consultation. The physician needs access to the patients’ medical history and results from tests which are being performed during the visit (Physician with Review Documentation privileges)
  • 7. RBAC • HL7 V3 Standard: Role-Based Access Control Healthcare Permission Catalog, Release 2 – Core RBAC elements (users, roles, objects, operations, and permissions) are transferred into operation and object definitions that can be adopted. – Introduces normative language to the HL7 permission vocabulary in constructing permissions {operation, object} pairs, for example, Permission Name: New Laboratory Order {CREATE, Laboratory Order} – should be considered as a baseline for interoperability between different policy domains. • ISO/TS 22600-2:2006 Health informatics — Privilege management and access control – Defines RBAC control schema based on harmonized functional and structural roles – The American ASTM E1986–98 standard has defined an American list of roles. ISO DTS 21298 defines a similar set of structural and functional roles which are referred to in the International Labour Organisation . • HL7 Version 3 Standard: Security and Privacy Ontology, Release 1 – Individual request for permission to perform an operation on an object must be logically consistent with the ontology. For example, the PhysicianFunctionalRole role has permission to create order entries, including laboratory orders, etc. On requesting permission for the actor of that role to create an account receivable, the reasoner will report an inconsistency.
  • 8. ABAC • A key advantage to the Attribute-based Access Control (ABAC) model is that there is no need for the requester to be known in advance to the system or resource to which access is sought. • As long as the attributes that the requestor supplies meet the criteria for gaining entry, access will be granted. • Ability to determine access without the need for a predefined list of individuals that are approved for access is critical in large enterprises where the people may join or leave the organization arbitrarily.
  • 9. ABAC vs. RBAC • Gartner Identity and Access Summit, Nov 2013 – By 2020, 70% of all businesses will use ABAC as the dominant mechanism to protect critical assets, up from 5% today • NIST Special Publication 800-162: Guide to ABAC Definition and Considerations – RBAC does not easily support multi-factor decisions (for example, decisions dependent on physical location, and specialized training such as for Health Insurance Portability and Accountability Act (HIPAA) records access; recent training on HIPAA data protection may be a prerequisite to view medical records.)
  • 10. PBAC • A resource is governed by a document that exactly specifies what subject credentials and requirements must be fulfilled in order to obtain access. • PBAC can be said to be a harmonization and standardization of the ABAC model at an enterprise level in support of specific governance objectives (regulation and legislation). • PBAC is by now the de-facto standard model for enforcing access control policies in service-oriented architectures.
  • 11. XACML • A widely used implementation of PBAC is given by eXtensible Access Control Language (XACML). It defines a language for the definition of policies and access requests and a complete workflow to achieve policy enforcement • EU Project epSOS uses XACML as a policy language for expressing access control for sensitive data such as patients healthcare information. • Core and hierarchical role based access control (RBAC) profile of XACML v2.0 (OASIS Standard, 1 February 2005) defines a profile for the use of XACML in expressing policies that use “core” and “hierarchical” RBAC
  • 12. Request <Request xmlns="urn:oasis:names:tc:xacml:2.0:context:schema:os" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="urn:oasis:names:tc:xacml:2.0:context:schema:os access_control-xacml-2.0-context-schema-os.xsd"> <Subject> <Attribute AttributeId="urn:oasis:names:tc:xacml:1.0:subject:subject-id" DataType="http://www.w3.org/2001/XMLSchema#string"> <AttributeValue>Julius Hibbert</AttributeValue> </Attribute> </Subject> <Resource> <Attribute AttributeId="urn:oasis:names:tc:xacml:1.0:resource:resource-id" DataType="http://www.w3.org/2001/XMLSchema#anyURI"> <AttributeValue>http://medico.com/record/patient/BartSimpson</AttributeValue> </Attribute> </Resource> <Action> <Attribute AttributeId="urn:oasis:names:tc:xacml:1.0:action:action-id" DataType="http://www.w3.org/2001/XMLSchema#string"> <AttributeValue>read</AttributeValue> </Attribute> </Action> <Environment /> </Request>
  • 13. Response <Response xmlns="urn:oasis:names:tc:xacml:2.0:context:schema:os" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="urn:oasis:names:tc:xacml:2.0:context:schema:os access_control-xacml-2.0-context-schema-os.xsd"> <Result> <Decision>Permit</Decision> <Status> <StatusCode Value="urn:oasis:names:tc:xacml:1.0:status:ok" /> </Status> </Result> </Response>
  • 14. Cross-Enterprise Security and Privacy Authorization (XSPA) Profile of XACML v2.0 for Healthcare v1.0 OASIS Standard, 1 November 2009, http://docs.oasis-open.org/xacml/xspa/v1.0/saml-xspa-1.0.html This profile specifies the use of XACML 2.0 to promote interoperability within the healthcare community by providing common semantics and vocabularies for interoperable policy request/response, policy lifecycle, and policy enforcement. Attribute ID* Identifier Type Valid Values subject:subject-id urn:oasis:names:tc:xacml:1.0:subject:subject-id String Is the name of the user as required by Health Insurance Portability and Accountability Act (HIPAA) Privacy Disclosure Accounting. The name will be typed as a string and in plain text. subject:organization urn:oasis:names:tc:xspa:1.0:subject:organization String Organization the requesting user belongs to as required by Health Insurance Portability and Accountability Act (HIPAA) Privacy Disclosure Accounting. The name will be typed as a string and in plain text. subject:organization-id urn:oasis:names:tc:xspa:1.0:subject:organization-id anyURI Unique identifier of the consuming organization and/or facility subject:hl7:permission urn:oasis:names:tc:xspa:1.0:subject:hl7:permission String Refer to [HL7-PERM] and its OID representation. subject:role urn:oasis:names:tc:xacml:2.0:subject:role String Structural Role refer to [ASTM E1986-98 (2005)] and its OID representation. subject:purposeofuse urn:oasis:names:tc:xspa:1,0:subject:purposeofuse String TREATMENT, PAYMENT, OPERATIONS, EMERGENCY, MARKETING, RESEARCH, REQUEST, PUBLICHEALTH resource:resource-id urn:oasis:names:tc:xacml:1.0:resource:resource-id String Unique identifier of the resource defined by and controlled by the servicing organization. In healthcare this is the patient unique identifier. resource:hl7:type urn:oasis:names:tc:xspa:1.0:resource:hl7:type String For minimum interoperability set of objects and supporting actions refer to [HL7-PERM] and their OID representations. resource:org:permission urn:oasis:names:tc:xspa:1.0:resource:org:hl7:permi ssions String Refer to [HL7-PERM] and its OID representation. This attribute holds permissions required by the servicing organization to grant access to a specific resource. SOAP SAML XACML Request wrapper The request message contains three protocol layers: • soapenv: A SOAP Envelope contains a SOAP Body. • xacml-samlp: SAML protocol layer, which is enabled by the XACML extension to the SAML protocol • xacml-context: is the XACML request/response layer The response message above contains three protocol layers: • soapenv: is the SOAP layer. A SOAP Envelope contains a SOAP Body. • samlp: in the response case the xacml extension is lower in the samlp: protocol. In particular, samlp: requires a saml:Assertion, which in turn includes a saml:Statement. It is within the saml:Statement that the xacml extension occurs and is referred to as xacml-saml: because it extends the saml:Assertion/saml:Statement with the XACMLAuthzDecisionStatementType. • xacml-context: is the XACML request/response layer
  • 15. Integrating the Healthcare Enterprise (IHE) Initiative • Designed to stimulate the integration of the healthcare information systems • Support the use of existing standards, e.g., HL7, ASTM, DICOM, ISO, IETF, OASIS rather than to define a new standards • IHE Europe (IHE-EUR) is supported by the European Institute for health Records (EuroRec). • IHE IT Infrastructure Technical Framework – Volume 1 (ITI TF-1): Integration Profiles • Cross-Enterprise Document Sharing (XDS), sharing clinical records within an XDS Affinity Domain • Cross-Enterprise User Assertion Profile (XUA), communicate claims about the identity • Basic Patient Privacy Consents (BPPC) • Patient Identifier Cross-referencing HL7 V3 (PIXV3), correlate a patient information from multiple sources • Cross-Community Access (XCA), query and retrieve patient relevant medical data held across multiple domains
  • 16. IHE IT-Infrastructure Access Control White Paper • Inflexibilities of RBAC in healthcare – people often switch among multiple roles – access rights vary depending on the state of the patient or the “operational mode” of the organization (e.g., nightshift, disaster management) • Policy Based Access Control – A policy is a set of rules, which control the security and privacy behavior of a given system. – Policy activation requires that attribute values have to be available. This can either be realized by: • the requestor, who includes them with the request message • the processing party who retrieves them on demand from a policy information point • XACML as candidate for policy encoding
  • 17. Policy Attributes and Attribute Sources
  • 18. Oracle Entitlement Server • A fine grained authorization solution – While OAG and OAM has authorization capabilities, in this field OES offers a much richer model. • OES supports ABAC(XACML), RBAC (NIST RBAC), ERBAC (Enterprise RBAC) and JAAS policy models. • Oracle API Gateway is natively integrated with OES - this requires no changes to the application code. – Oracle API Gateway can use OES to manage authorization for Web Services. The integration hook between OAG and OES is the OES 11g Authorization filter
  • 19. Oracle Entitlement Server • API Gateway ‘s XACML PEP filter enables you to configure the API Gateway to act as a PEP. The API Gateway intercepts a user request to a resource, and enforces the decision from the Policy Decision Point (PDP). • When Oracle Entitlements Server is deployed, a Policy Decision Point (PDP) receives a request for authorization, evaluates it based on applicable policies, reaches a decision and returns the decision to the Policy Enforcement Point (PEP).

Editor's Notes

  1. Policy Profile and Attribute Stubs A policy profile can be used to restrict the expressiveness of a policy language to the attribute stubs that have been defined in advance. A consent template is to be defined that can be mapped onto a corresponding policy profile. For the sample scenario this template will look like: I hereby authorize [roles] at [organizations] to use the “Historical Database” Application in order to access all [Patient] [kind-of-data] for the purpose of [purpose]. A valid instance might be: I hereby authorize physicians at Clinic A to use the “Historical Database” Application in order to access all my lab data for the purpose of medical treatment.
  2. Subject attributes provide additional information on the user that tries to access a resource. An example for a subject attributes is a role assignment (e.g., "Dr. John Doe is a cardiologist.") The main source for subject attributes are standalone identity management systems or identity management components that are integrated into the HIS or similar systems. Resource attributes provide information on the requested resource and are widely used in resource security policies. An example might be the confidentiality level of an accessed information object or the information type or class (e.g., "A metadata entry for a medical information object shows that the requested resource contains sensitive medical information."). Resource attributes can often be derived from resource metadata (e.g., contained in registries). Context attributes refer to activities, purposes, or the context of an intended resource access. Examples are the activated roles that are assigned to subjects, or certain process or workflow steps (e.g., "Medical information is requested within an emergency context."). The main attribute source can be identified in the request message itself and in systems that control the information workflow, e.g., HIS or LIS. Software Application/System attributes refers to characteristics of a software application/system. Examples of application attributes are confidentiality levels and limitations in the purpose of use that might lead to obligations on certain operations (e.g., “Every access that is mediated through applications with full access to a patient’s data has to be logged.”). Application attributes are, in many cases, hard-coded within the application and mapped onto other attributes (e.g., resource and context) during the mediation of an access operation. Patient attributes refer to the patient, his characteristics, and wishes. Prominent examples include attributes concerning the sanity or age of the patient and attributes expressing his consents (e.g., "The patient documented his consent to use a certain healthcare application on his electronic health card."). Sources for patient attributes are, among others, patient management systems and electronic health cards.