[go: up one dir, main page]

Skip to main content
Log in

HDI: Integrating Health Data and Tools

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Health systems globally are looking to make better use of the data they capture in order to improve their services, both for service provision and clinical outcome. One way of doing this is to integrate existing data sources. However, major technical and legal questions exist concerning data integration, data quality, data security and privacy in health data usage. In this paper, we present the HDITM tool, that is currently under development at the e-Health Research Centre. Firstly we describe the HDITM architecture and its data integration capabilities. We then consider two of its core capabilities (1) privacy-preserving similarity linkage and (2) on-line analytical techniques and report generating. Finally, we discuss how HDI functionality can be used to provide the capabilities of a knowledge based medical system. The e-Health Research Centre is currently working with the Queensland Health department to deploy the software in practice.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Taylor KL, O’Keefe CM, Colton J, Baxter R, Sparks R, Srinivasan U, Cameron L. Lefort MA (2004) A service oriented architecture for a health research data network. Proceedings of SSDBM

  2. eHealth Research Centre in Australia. Access from http://www. e-hrc.net/ in June 2005

  3. Christine M OKeefe LG, Ming Yung, Baxter R (2004) Privacy-preserving linkage and data extraction protocol. In: workshop on privacy in electronic society in conjunction with the 11th ACM CCS meeting, Washington DC

  4. Pang C, Taylor K, Zhang X, Cameron M (2005) Generating multidimensional schema from aggregation queries. In: 5th International Conference on web information systems engineering

  5. Pang C, Taylor K, Zhang X (2003) Multidimensional schema generator on queries. CSIRO ICT Centre, Technical Report, 03(186)

  6. Hansen D, Daly C, Harrop K, O’Dwyer M, Pang C, Ryan-Brown J (2005) HDI: research software to commercial product, ASWEC 2005 industry experience papers

  7. Vladimir Zadorozhny, Louiqa Raschid, Maria Esther Vidal, Urhan, Laura Bright (2002) Efficient evaluation of queries in a mediator for web sources. In: Proceedings of the 2002 ACM SIGMOD international conference on management of data, p 85–96. ACM Press, New York

  8. Shehab M, Bertino E, Ghafoor A (2005) Serat: Secure role mapping technique for decentralized secure interoperability. In: Proceedings of the tenth ACM symposium on access control models and technologies, pp 159–167, New York, NY, USA, ACM Press

  9. Wonahoesodo R, Tari Z (2004) A role based access control for web services. In: Proceedings of the 2004 IEEE International conference on services computing (SCC’04)

  10. Organization for the advancement of structured information standards (OASIS) (2003) Security assertions markup language (SAML) version 1.1, Sept 2003

  11. Nyanchama M, Osborn S (1999) The role graph model and conflict of interest. ACM Trans Inf Syst Secur, 2(1):3–33, 1999

    Google Scholar 

  12. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. IEEE Comput 29(2):38–47

    Google Scholar 

  13. Pang C, Zhang X, Zhang Y, Kotagiri R (2005) Maintenance of access roles in SQL with role hiding. CSIRO Technical Report 2005

  14. Churches T, Christen P (2004) Some methods for blindfolded record linkage. BMC medical informatics and decision making, 4(1):9

    Article  Google Scholar 

  15. Vaidya J, Clifton C (2003) Leveraging the “multi” in secure multi-party computation. In: Proceedings of the 2003 ACM workshop on privacy in the electronic society, p 53

  16. Willenborg L, deWaal T (2001) Elements of statistical disclosure control, vol. 155. Lect Notes in Stat Springer Berlin heildgberg New York

  17. A core clinical data set (Australia) (2005) Accessed from http:// www.ncci.org.au/projects/data/dat01.htm in June 2005

  18. National E-health transition authority (Australia) (2005) Accessed from http://www.ahic.org.au/nehta/ in June 2005

  19. Atallah MJ, Kerschbaum F, Du W (2003) Secure and private sequence comparisons. In: WPES ’03: Proceedings of the 2003 ACM workshop on privacy in the electronic society, p 39

  20. Agrawal R, Evfimievski A, Srikant R (2003) Information sharing across private databases. In: Proceedings of ACM SIGMOD international conference on management of data, p 86

  21. Organization for the advancement of structured information standards (OASIS) (2003) Extensible access control markup language (XACML) version1.0, Feb 2003

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David P. Hansen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hansen, D.P., Pang, C. & Maeder, A. HDI: Integrating Health Data and Tools. Soft Comput 11, 361–367 (2007). https://doi.org/10.1007/s00500-006-0090-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-006-0090-6

Keywords

Navigation