Peter R. Croll

Learn More
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a pool of pseudonymous identiers for use in different healthcare services. Without revealing the identity of consumers, health record data from different medical databases(More)
To ensure that patient confidentiality is securely maintained, health ICT applications that contain sensitive personal information demand comprehensive privacy policies. Determining the adequacy of these policies to meet legal conformity together with clinical users and patient expectation is demanding in practice. Organisations and agencies looking to(More)
PURPOSE Health managers, administrators and health practitioners now face new challenges due to the increasing dependency being placed on electronic health information systems. This paper focuses on Electronic Health Records for determining the critical attributes for e-health system development. The proposed QUiPS model aims to provide a framework for(More)
Data warehousing methodologies share a common set of tasks, including business requirements analysis, data design, architectural design, implementation and deployment. Clinical data warehouses are complex and time consuming to review a series of patient records however it is one of the efficient data repository existing to deliver quality patient care. Data(More)
The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MACs), namely those provided by SELinux, to secure application-level data. Particular emphasis is placed on health-care records located on the grid. The paper disccuses the importance of a trusted computing base in providing application security. It describes a(More)
The design of a fault tolerant system would be enhanced if a rapid prototyping approach could be conceived which allows fault tolerance to be modelled quickly, and faults simulated to analyse the behaviour of the system. This paper concentrates on how a functional specification language, and its environment, can be used to describe and investigate the(More)
Guarenteeing the timeliness of a parallel hard real-time system requires knon+dge of its commrinication behaviour. Analysis of the communication structure call identib potential livelock and deadlock in parallel systems. An approach n'hich describes the communications of parallel systems. called a client-server behaviorrr graph, is given which enables a(More)
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure that sensitive health information can be adequately protected yet still be accessible only to those that "need-to-know". To achieve this and ensure sustainability over the longer(More)