Last years experienced the growth of new technologies able to remotely monitor health state of persons. This includes both (even complex) Medical devices and all kind of wearable device. In addition, with the increasing use of Cloud technologies to manage and store sensitive data from patients, the problem of assuring data privacy is more and more important in E-Health systems. Privacy requirements in Medical domains are not only defined by service providers or users, but Legal rules regulate the whole management and storage processes of health records. The use of Model Driven techniques for E-Health systems is appealing especially if formal verification of privacy requirements is enacted. In this paper we extend the MetaMORP(h)OSY modelling profile in order to explicitly consider privacy requirements for data. A novel model transformation algorithm is described for the application of Model Checking techniques to privacy verification. © 2015, IIIA-CSIC. All rights reserved.
A model driven approach to data privacy verification in e-health systems / Amato, Flora; Moscato, Francesco. - In: TRANSACTIONS ON DATA PRIVACY. - ISSN 1888-5063. - 8:3(2015), pp. 273-296.
A model driven approach to data privacy verification in e-health systems
AMATO, FLORA;MOSCATO, FRANCESCO
2015
Abstract
Last years experienced the growth of new technologies able to remotely monitor health state of persons. This includes both (even complex) Medical devices and all kind of wearable device. In addition, with the increasing use of Cloud technologies to manage and store sensitive data from patients, the problem of assuring data privacy is more and more important in E-Health systems. Privacy requirements in Medical domains are not only defined by service providers or users, but Legal rules regulate the whole management and storage processes of health records. The use of Model Driven techniques for E-Health systems is appealing especially if formal verification of privacy requirements is enacted. In this paper we extend the MetaMORP(h)OSY modelling profile in order to explicitly consider privacy requirements for data. A novel model transformation algorithm is described for the application of Model Checking techniques to privacy verification. © 2015, IIIA-CSIC. All rights reserved.File | Dimensione | Formato | |
---|---|---|---|
tdp.a236a15.pdf
solo utenti autorizzati
Descrizione: Articolo Pubblicato
Tipologia:
Documento in Post-print
Licenza:
Accesso privato/ristretto
Dimensione
1.12 MB
Formato
Adobe PDF
|
1.12 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.