the context of eHealth, because of the sensible
information, data security and privacy. On the other
hand, legal barriers on exchange identities
information, makes the need for research new
compliance architectural and models. In general,
very few studies have been implemented. This is an
indicator that identity management in eHealth is
much more complex than it seems and that, reliable
and trustable, data security and privacy are very
difficult to achieve.
Considering the patients and health professionals
mobility and that the access should be granted
anywhere, several research groups are defining
standards to provide interoperability between
different eHealth systems. The standards should
provide privacy and security related with identity
exchange information and the control of key issues
such as observability, linkability, data aggregation
and profiling. Also, there is no consensus and no
standardization methods for anonymisation
identification for research propose.
EHealth allows patients to actively participate in
the process of health care, improves their awareness
and feeling of security, and ultimately leads to their
empowerment. Nevertheless, there is no evidence
found on the acceptance of patients and health care
providers on the use of trustable mechanisms and
models on identity management to provide enhanced
security and privacy. Attitude and behaviour for
patient and health care providers related with
identity management in eHealth should be
considered for further research.
5 CONCLUSIONS
Identity management is a key component for
eHealth. The need for a standard methodology for
identity and authentication interoperability between
different stakeholders in eHealth was identified.
Although a large research effort was found in the
context of identity management in the information
society, very few studies and experiences were
found in the eHealth context. Since eHealth deals
with sensible information there is a need for further
research work showing evidence that privacy and
security are really achieved.
Legal and security issues associated with
availability, integrity and confidentiality, related
with identity in eHealth, were expected to be found
in the literature. However no such themes were
found. These are important themes that should be
further discussed because they are the main barriers
for the implementation of identity management in
the context of eHealth.
ACKNOWLEDGEMENTS
The authors acknowledge the help of Luis Antunes
for fruitful discussions on this work.
REFERENCES
Al-Nayadi, F., Abawajy, J. 2007. An Authentication
Framework For E-Health Systems. Signal Processing
And Information Technology, 2007 Ieee International
Symposium On.
Au, R., Croll, P. 2008. Consumer-Centric And Privacy-
Preserving Identity Management For Distributed E-
Health Systems. Hawaii International Conference On
System Sciences, Proceedings Of The 41st Annual.
Dagdee, N., Vijaywargiya, R. 2009. Credencial Based
Hybrid Access Control Methodology For Shared
Electronic Health Records. Information Management
And Engineering, 2009. Icime '09. International
Conference On.
Hildebrand, C., Pharow, P., Engelbrecht, R., Blobel, B.,
Savastano, M., Hovsto, A. 2006. Biohealth-The Need
For Security And Identity Management Standards In
Ehealth. Stud Health Technol Inform.
Iacono, L. L. 2007. Multi-Centric Universal
Pseudonymisation For Secondary Use Of The Ehr.
Stud Health Technol Inform.: Pubmed.
Mina, D., Scandariato, R., De Cock, D., Preneel, B.,
Joosen, W. 2008. Identity In Federated Electronic
Healthcare. Wireless Days, 2008. Wd '08. 1st Ifip.
Netha. 2007. “Framework For Analysing, Planning And
Implementing Identity Management Within E-Health”,
[Online]. [Accessed 8 January 2010].
Oh, H., Rizo, C., Enkin, M., Jadad, A. 2005. What Is
Ehealth (3): A Systematic Review Of Published
Definitions. Journal Of Medical Internet Research, 7
(1).
Peyton, L., Jun, Hu., Chintan, Doshi., Seguin, P. 2007.
Addressing Privacy In A Federated Identity
Management Network For Ehealth. . Eighth World
Congress On The Management Of Ebusiness, 2007.
Wcmeb 2007. .
Pommerening, K., Reng, M. 2004. Secondary Use Of The
Ehr Via Pseudonymisation Stud Health Technol
Inform. Pubmed.
Quantin, C., Allaert, F. A., Fassa, M., Riandey, B.,
Avillach, P., Cohen, O. 2007. How To Manage Secure
Direct Access Of European Patients To Their
Computerized Medical Record And Personal Medical
Record. Stud Health Technol Inform. Pubmed.
Slamanig, D., Stingl, C. 2008. Privacy Aspects Of
Ehealth. Availability, Reliability And Security. Third
International Conference On 2008.
HEALTHINF 2011 - International Conference on Health Informatics
458