Learn More
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a pool of pseudonymous identiers for use in different healthcare services. Without revealing the identity of consumers, health record data from different medical databases(More)
To ensure that patient confidentiality is securely maintained, health ICT applications that contain sensitive personal information demand comprehensive privacy policies. Determining the adequacy of these policies to meet legal conformity together with clinical users and patient expectation is demanding in practice. Organisations and agencies looking to(More)
PURPOSE Health managers, administrators and health practitioners now face new challenges due to the increasing dependency being placed on electronic health information systems. This paper focuses on Electronic Health Records for determining the critical attributes for e-health system development. The proposed QUiPS model aims to provide a framework for(More)
Data warehousing methodologies share a common set of tasks, including business requirements analysis, data design, architectural design, implementation and deployment. Clinical data warehouses are complex and time consuming to review a series of patient records however it is one of the efficient data repository existing to deliver quality patient care. Data(More)
The Development Framework translates application-specific system specifications into parallel, hard real-time implementations, using methods that are both familiar to developers and optimal for the application. The Development Framework approach applies CASE tools-as well as several new tools-to the development of distributed systems, so designers can(More)
The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MACs), namely those provided by SELinux, to secure application-level data. Particular emphasis is placed on health-care records located on the grid. The paper disccuses the importance of a trusted computing base in providing application security. It describes a(More)
In an emergency there are many stages of Medical response. This paper focuses on the first response stage of an emergency medical incident, for example, a sporting accident. Today's Information Technology together with mobile devices now permits vital medical information regarding an individual to be available at the scene. Those first in attendance are(More)
The design of a fault tolerant system would be enhanced if a rapid prototyping approach could be conceived which allows fault tolerance to be modelled quickly, and faults simulated to analyse the behaviour of the system. This paper concentrates on how a functional specification language, and its environment, can be used to describe and investigate the(More)
Guarenteeing the timeliness of a parallel hard real-time system requires knon+dge of its commrinication behaviour. Analysis of the communication structure call identib potential livelock and deadlock in parallel systems. An approach n'hich describes the communications of parallel systems. called a client-server behaviorrr graph, is given which enables a(More)