Figure 1: HSJ.ICU Generic Infrastructure
be integrated. Figure 1 presents a generic
architecture of the EPR system to be implemented.
It shows the heterogeneity of the infrastructure that
supports the healthcare information flow within the
hospital. The departmental systems presented above
have different infrastructures and types of workflow.
In some of these departments, patient records are still
paper-based while others have a mixture of
procedures and technology that make the integration
of a common platform not straightforward.
Another important step is to assess what are the
main concerns of the healthcare professionals
involved. This is done with several meetings with
each department’s staff. Other contacts made
afterwards during the development of the project are
also taken into consideration.
In summary, security services will be
implemented so that information security (mainly
user-driven) can be effectively achieved whilst still
allowing for the proper use of the system. It follows
the description of the security services and problems
that need to be taken into consideration whilst
developing this project.
2.1 Confidentiality
In terms of user-driven security issues,
confidentiality can be provided by controlling access
to the system and make sure that only authorized
users access information. When this rule is breached,
unauthorized users’ actions along with their
identification should be recorded for further
responsibility and subsequent legal actions.
Also, this project involves the integration of
several physical places making it crucial that all
communication channels are protected. This will
provide for the secure information flow. Any breach
that may occur (e.g. eavesdropping) should not allow
for unauthorized access to sensitive information.
The following two sections will explain the
methodology used for both these issues (access
control and secure communications) in more detail.
2.1.1 Access Control
Controlling the access to sensitive information is
fundamental; moreover when that information relates
to healthcare patient sensitive information. The
heterogeneous environment, such is the healthcare
environment where different people and services are
required to interact, make it more difficult to control
and provide for its proper use. Nevertheless, there
are ways to provide for proper access control.
The main step is to make sure every user can be
uniquely identified so that his actions can be easily
traced. Usually, every healthcare professional within
the hospital has his reference number, which is
unique.
In order to provide for an efficient way for
identification and authentication, the development of
access control tools is based on a European
prestandard, ENV 12251 (CEN/TC251, 2000). This
allowed for a better understanding and definition of
some basic, standard rules pertaining to the use of
login and password.
For this purpose, the standard protocol LDAP
(IETF, 2003) was introduced. In this specific case,
due to institutional policy demands, the chosen tool
to provide for that protocol is the Microsoft Active
Directory (MSDN, 2003). Some results from this
implementation are described in section 3.
2.1.2 Secure Communications
The same issue about heterogeneity applies to this
section (Figure 1). Each departmental system is
positioned in a different physical location within the
hospital while the database server and file system are
placed somewhere else. It becomes very difficult to
both protect and monitor every part that comprises
the system. Internet technology is the most
appropriate in this case because several platforms
and processes need to be integrated (Correia, 2001).
This technology is cost-effective, easy to implement
and has standards that a wide number of people
nowadays is used to interact with.
However, it is very hard to protect this
infrastructure against eavesdropping, tampering or
message forgery, when all the wiring and equipment
is spread all over a big hospital. Means to prevent (or
SECURING A WEB-BASED EPR: AN APPROACH TO SECURE A CENTRALIZED EPR WITHIN A HOSPITAL
55