Peter R. Croll

Learn More
To ensure that patient confidentiality is securely maintained, health ICT applications that contain sensitive personal information demand comprehensive privacy policies. Determining the adequacy of these policies to meet legal conformity together with clinical users and patient expectation is demanding in practice. Organisations and agencies looking to(More)
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a pool of pseudonymous identiers for use in different healthcare services. Without revealing the identity of consumers, health record data from different medical databases(More)
The Development Framework translates application-specific system specifications into parallel, hard real-time implementations, using methods that are both familiar to developers and optimal for the application. The Development Framework approach applies CASE tools-as well as several new tools-to the development of distributed systems, so designers can(More)
The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MACs), namely those provided by SELinux, to secure application-level data. Particular emphasis is placed on health-care records located on the grid. The paper disccuses the importance of a trusted computing base in providing application security. It describes a(More)
PURPOSE Health managers, administrators and health practitioners now face new challenges due to the increasing dependency being placed on electronic health information systems. This paper focuses on Electronic Health Records for determining the critical attributes for e-health system development. The proposed QUiPS model aims to provide a framework for(More)
Guarenteeing the timeliness of a parallel hard realtime system requires knon+dge of its commrinication behaviour. Analysis of the communication structure call identib potential livelock and deadlock in parallel systems. An approach n’hich describes the communications of parallel systems. called a client-server behaviorrr graph, is given which enables a(More)
Software development is inherently risky, however the need to adapt processes intended for larger organisations introduces a new element of risk. In addition, the nature of many new software products can be described as "critical" and therefore should undergo a formal risk assessment procedure. Despite the majority of software projects involving these(More)