requests using computer applications that provide
decision support and can deliver the requests
electronically in structured form to appropriate
medical organizations (e.g. diagnostic centers,
hospitals). Moreover, the radiological reports
(incorporating image and text) are stored in a cloud
infrastructure while granting relevant access rights
to referring physicians. Hence, the term
"eRadiology" has been used regardless of whether
such radiological requests are subsequently printed
and given to the patient, faxed to a medical center,
or delivered through more structured electronic
transfer. In this framework, the proposed security
mechanism, embedded into an eRadiology cloud
portal application, ensures authorized invocation of
web services and execution of associated BPEL
tasks subject to the constraints imposed by the
execution context. One particular assumption of the
proposed system specifically calls for the integration
of eRadiology systems with PHRs and, possibly,
other external systems since systems integration is a
prerequisite for accurate safety alerts, patient
monitoring and other recommended capabilities. The
security framework proposed should aid eRadiology
developers in comparing alternative systems and in
prioritizing their development efforts. However,
there is an obvious need for its real world validation
before it is widely adopted. This requires setting up
a cloud computing infrastructure for eHealth
services, an endeavour that needs much more than
proven technological feasibility.
REFERENCES
Andriole, K.P., Khorasani R., 2010. Cloud Computing:
What Is It and Could it Be Useful?. In Journal of
American College of Radiology, Vol.7, No. 4, pp. 252-
254.
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.
H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin,
A., Stoica, I., Zaharia, M., 2009. Above the Clouds: A
Berkely View of Cloud Computing. Technical Report
No. UCB/EECS-2009-28, http://www.eecs.
berkeley.edu/Pubs/TechRpts/2009/EECS-2009-
28.html.
Ash, J., Berg, M., Coiera, E., 2004. Some Unintended
Consequences of Information Technology in Health
Care: The Nature of Patient Care Information System
Related Errors. In Journal of the American Medical
Informatics Association,Vol. 11, No. 2, pp. 104-112.
Bell, D.S., Cretin, S., Marken, R.S., Landman, A.B., 2004.
A Conceptual Framework for Evaluating Outpatient
Electronic Prescribing Systems Based on Their
Functional Capabilities. In Journal of the American
Medical Informatics Association, Vol. 11, No. 1, pp.
60-70.
Benjamin, M., Aradia, Y., Shreibera, R., 2010. From
shared data to sharing workflow: Merging PACS and
teleradiology. In European Journal of Radiology, Vol.
73, pp. 3-9.
Bruening, P., Treacy, B, 2009. Cloud Computing: Privacy,
Security Challenges. In The Bureau of National
Affairs.
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic,
I., 2009. Cloud computing and emerging IT
platforms:Vision, hype, and reality for delivering
computing as the 5th utility. In Future Generation
Computer Systems, Vol 25, pp. 599-616.
Cavoukian, A., 2008. Privacy in the clouds. In Identity in
the Information Society, Vol. 1, No. 1, pp. 89-108.
Collin, S., Reeves, B.C., Hendy, J., Fulop, N., Hutchings,
A., Priedane, E., 2008. Implementation of
computerised physician order entry (CPOE) and
picture archiving and communication systems (PACS)
in the NHS: quantitative before and after study. In
British Medical Journal, 337:a939.
Harvey, D., 2010. Record in the Clouds. In Radiology
Today, Vol. 11, No. 2, p. 10.
IBM Cloud computing White paper, 2009. IBM Point of
View: Security and Cloud Computing,
ftp://public.dhe.ibm.com/common/ssi/sa/wh/n/tiw1404
5usen/TIW14045USEN_HR.pdf.
IBM Corporation, 2005. IBM Websphere Workflow –
Getting Started with Buildtime V. 3.6.
Information Technology in Healthcare, 2004. Report to
the Congress: New Approaches in Medicare,
http://www.medpac.gov/publications/congressional_re
ports/June04_ch7.pdf.
Java Agent Development Framework,
http://jade.tilab.com/.
Kaelber, D.C., Shah, S., Vincent, A., Pan, E., Hook, J.M.,
Johnston, D., Bates, D.W., Middleton, B., 2008. The
Value of Personal Health Records, By the Center for
Information Technology Leadership (CITL),
http://www.citl.org/publications/_pdf/CITL_PHR_Rep
ort.pdf.
Metfessel, B.A., 2007. Financial and Clinical Features of
Hospital Information Systems. In Healthcare
Organizations, Journal of Financial Management
Strategies, Vol. 2, No. 3.
Muttig I., Burton C., 2009. Cloud Security Technologies.
In Information Security Technical Report, Vol. 14, pp.
1-6.
OASIS Standards, http://www.oasis-open.org/.
Pearson, S., 2009. Taking Account of Privacy when
Designing Cloud Computing Services. Proceedings of
the 2009 ICSE Workshop on Software Engineering
Challenges of Cloud Computing, Vancouver, Canada.
Pearlman, L., Welch, V., Foster, I., Kesselman, C.,
Tuecke, S., 2002. A Community Authorization
Service for Group Collaboration. Proceedings of the
3rd IEEE International Workshop on Policies for
Distributed Systems and Networks, Monterey, USA.
Polymenopoulou, M., Malamateniou, F., Vassilacopoulos,
G., 2005. Emergency Healthcare Process Automation
KMIS 2010 - International Conference on Knowledge Management and Information Sharing
278