US20180150651A1 - Creating an access control policy based on consumer privacy preferences - Google Patents

Creating an access control policy based on consumer privacy preferences Download PDF

Info

Publication number
US20180150651A1
US20180150651A1 US15/865,525 US201815865525A US2018150651A1 US 20180150651 A1 US20180150651 A1 US 20180150651A1 US 201815865525 A US201815865525 A US 201815865525A US 2018150651 A1 US2018150651 A1 US 2018150651A1
Authority
US
United States
Prior art keywords
documents
user
topic
access control
document
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/865,525
Inventor
Milan Petkovic
Vojkan Mihajlovic
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips NV filed Critical Koninklijke Philips NV
Priority to US15/865,525 priority Critical patent/US20180150651A1/en
Publication of US20180150651A1 publication Critical patent/US20180150651A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/3331Query processing
    • G06F16/334Query execution
    • G06F17/30675
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/22Social work

Definitions

  • the invention relates to creating an access control policy.
  • the invention further relates to configuring an access control system with an access control policy.
  • Electronic health records as well as electronic personal health records, have been increasingly used to replace paper records in professional healthcare and home healthcare.
  • Informed consent is a very important process in professional healthcare, in which the patient makes some choices with respect to, inter alia, the use of his health data by healthcare providers.
  • the patient has legal rights to hide or limit access to certain parts of his electronic healthcare records.
  • a patient may restrict access to documents relating to mental health or drug abuse, such that only the patient's psychiatrist has access to these documents.
  • restricted access prevents others from having access to a patient's records related to AIDS.
  • Different security mechanisms have been developed to technologically facilitate this right, such as the use of sealed envelopes in the Spine system of NHS in the UK or a similar mechanism in the NICTIZ system in The Netherlands.
  • the patient In the domain of personal health records, the patient is solely responsible for defining who has access to his records. Very often the patient has a desire to realize a very complex policy, especially in the case that the patient wants to give access to certain healthcare providers, family or friends. In some cases, the patient might want to block them from being able to access certain parts of his/her records.
  • HL-7 IHE and HITSP standardize interactions related to patient consent as well as formats in which consent can be specified.
  • HL-7 specifies CDA R2 consent directive, while IHE developed Basic Privacy Patient consent profile.
  • HL-7 also standardized vocabularies used for access control, such as an object vocabulary that describes different data types of electronic health records. These data types are used by the access control system, which assigns permissions/restrictions to different users with respect to these data types.
  • the paper discloses a model in which the semantics and structural composition of EHR documents is formulated in a hierarchical structure, where internal sub-objects are distinguished and associated with properties to address important criteria for medical data sharing such as data types, intended purposes and information sensitivities.
  • Both the EHR instances and the aggregated virtual composite EHR are uniformly modelled as a labelled hierarchical structure. Relevant properties are categorized into three dimensions: origin, sensitivity, and object type.
  • a first aspect of the invention provides a system comprising
  • a user interface for enabling a user to indicate a topic and a set of permissions
  • a document analyzer for analyzing the content of a plurality of documents to find a set of documents relating to the topic
  • an associating subsystem for associating the set of permissions with the set of documents to obtain an access control policy.
  • the system takes into account the content of the plurality of documents, the system is able to more accurately determine the set of documents to which the user intends to apply the set of permissions. This may provide a better result than an approach which only takes into account the structure or a global classification of the documents or records.
  • the user may be more confident that the topic is translated well into a set of documents which relate to the topic.
  • it becomes easier for the user to create a fine-grained access control policy because the user is less concerned with any hierarchical structure in which documents are stored, and thus the user needs to know fewer details of the structure of the information system.
  • the document analyzer may comprise a property finder for analyzing the content of a plurality of documents to find at least one distinguishing property of documents relating to the topic.
  • the document analyzer may further comprise a document selector for selecting the set of documents, based on the distinguishing property.
  • the property finder helps to improve the selection of the relevant documents. By finding a distinguishing property of the documents relating to the topic, it becomes possible to select the set of documents by searching for documents having that property. By virtue of the analysis of the content of documents to find a distinguishing property, it is not necessary to define all possible properties of all possible topics beforehand, which would be a labor-intensive and error-prone job. Moreover, the property finder may give more reliable results in an environment where the topics and properties of documents relating thereto are subject to change.
  • the document analyzer may comprise a document pre-selector for selecting the plurality of documents that are analyzed by the property finder, based on the topic. This helps to determine the plurality of documents. For example, the document pre-selector selects a plurality of documents relating to the topic. Such selection may be performed by matching of the document type with the topic, or by analyzing the content of documents and selecting documents whose content contains one or more words relating to the topic.
  • the document analyzer may comprise a data type selector for selecting at least one data type, based on the topic.
  • the document pre-selector may be arranged for selecting a plurality of documents of the selected data type. This is an efficient way to find a plurality of documents which are suitable to find the at least one distinguishing property.
  • the user interface may be arranged for enabling the user to adapt the set of documents found by the document analyzer to obtain an adapted set of documents, and wherein the associating subsystem is arranged for associating the access control policy with the adapted set of documents.
  • This allows the system to take into account fine-tuning choices made by the user.
  • the system may be arranged for, based on the user-made choices, deriving further distinguishing properties or refining the distinguishing properties, based on machine learning techniques, to improve future uses of the system.
  • the user interface may be arranged for enabling the user to make a change to the at least one distinguishing property found by the property finder, and wherein the document selector is arranged for selecting the set of documents, based on the modified distinguishing property.
  • This enables the user to refine the properties used to select the documents the user does not agree with, for example to correct a property found by the property finder.
  • Such changes can be used to improve the algorithms used in the property finder in future uses, using a machine learning technique, for example.
  • the change may comprise the removal of one or more of the distinguishing properties from the at least one distinguishing property. For example, if a user thinks that one of the properties is not relevant for him, the user may simply remove that property, so that the removed property will not be used this time for selection of documents.
  • the topic may comprise a keyword. This allows the document analyzer to use string matching techniques to find the topic as a keyword occurring in a document.
  • the topic may be represented by, for example, an icon which may be displayed on screen, enabling a user to select one of a plurality of graphical representations of topics, for example.
  • the topic may be represented by a keyword in the system.
  • a topic may also be represented by a collection of keywords, for example words which are synonyms or words which are semantically closely related to each other.
  • the topic may also comprise a document type.
  • the document analyzer may be arranged for searching for the keyword in the content of the documents. This allows an efficient implementation of the document analyzer.
  • the document analyzer may be arranged for finding further keywords, based on the content of the documents containing the keywords, and for selecting the set of documents, based on the further keywords.
  • This finding of further keywords may be based on a frequency analysis or on other information retrieval and/or natural language processing techniques, to find further keywords which are related to the keyword originally indicated by the user.
  • the at least one distinguishing property may comprise a data type or a keyword. These two kinds of properties are highly suitable to implement an accurate and/or efficient selection process.
  • the property finder may be arranged for applying natural language processing and/or an information retrieval method to the content of the plurality of documents. Such techniques, known in the art per se, may be applied to successfully find a distinguishing property.
  • the system may comprise an access control subsystem arranged for being configured with the access control policy obtained by the associating subsystem.
  • the access control subsystem configured with the access control policy, may enforce the access control in the way the user desires.
  • the invention provides a workstation comprising the system set forth.
  • the invention provides a method of creating an access control policy, comprising
  • the invention provides a computer program product comprising instructions for causing a processor system to perform the method set forth.
  • FIG. 1 is a block diagram of a system for creating an access control policy with an access control system
  • FIG. 2 is a block diagram of another system for creating an access control policy with an access control system
  • FIG. 3 is a flowchart of a method of creating an access control policy
  • FIG. 4 is a block diagram of an access control system including a system for creating an access control policy
  • FIG. 5 is a sketch of a user interface used for creating an access control policy.
  • Information retrieval methods may be based on the term statistics in a collection of textual documents, i.e., using the number of term occurrences in a document (term frequency) and/or in a collection (collection frequency), and the number of documents containing a term. This is explained in Baeza-Yates, R., & Ribeiro-Neto, B. (1999). Modern Information Retrieval . Essex, UK: ACM Press (hereinafter: Baeza-Yates et al.). Besides information search, such statistical information, along with available ontologies, can be useful in helping the user to define various properties related to the data collection in question.
  • EHRs electronic health records
  • object vocabularies used by EHR systems such as the one of HL-7 described above. They have difficulties in specifying their privacy policies and consent, as there is a large discrepancy between their preferences on the one hand and vocabularies used in access control systems on the other hand. Therefore, there is a need to translate their high-level preferences into machine-readable policies that constrain the use of their health data in a well-controlled, fine-grained manner.
  • a patient/consumer may want to set up his/her preferences for his/her personal health record (PHR) imported from an electronic medical record from his/her hospital. For example, let us assume that he/she wants to share his/her record with several users, but wants to hide some information, such as the fact that he/she had a certain disease (e.g. a mental disorder, drug abuse, or AIDS). He/She does not want to review all his/her records in the database one by one and exclude and/or specify permissions for each instance of his/her records in the database that contain the sensitive information. It is neither sufficient to exclude particular data types, as the patient/consumer cannot anticipate all data types and records that might contain the sensitive information.
  • PHR personal health record
  • the patient wants to convey to the IT system in an easy way that he/she wants to hide all the records related to the sensitive information, for example all records from which a third person could understand that the patient/consumer has AIDS.
  • the patient/consumer would like the system to translate this high-level policy (e.g. a keyword, ‘AIDS’) into a machine-readable access control policy that defines permissions or restrictions at the level of the instances of data types (objects) specified by for example the HL-7 vocabulary.
  • the access control policy generated by the system could be defined at the level of data types. However, it may also be defined at the level of instances of data objects, for example specifying permissions for individual documents.
  • an electronic health record may contain, among other data types, also the ‘prescription order’ data type, and the electronic health record may have several instances of this data type. It is possible that only one instance of the type ‘prescription order’ contains the sensitive information, e.g. information related to AIDS. Only this particular instance of the type ‘prescription order’ is associated with the special permissions relating to AIDS. The other instances of the type ‘prescription order’ may be associated with a set of permissions generally applying to instances of the type ‘prescription order’.
  • the system and method disclosed herein may be used to translate the consumer/patient input (privacy preference) into a machine-readable access control policy.
  • the consumer input i.e. privacy preferences, may be in the form of the tuple (user identifier, permission, keyword).
  • the tuple Doctor John Smith, Read, AIDS
  • the machine-readable policy may be in the form of the tuple (user identifier, permission, data object identifier).
  • the latter tuple would specify a data object to which a user has a particular permission.
  • the techniques disclosed in this description may be used to map a keyword or topic specified by the patient into a set of objects in the electronic health record that contain information related to the keyword.
  • FIG. 1 illustrates aspects of a system for generating an access control policy.
  • the rectangles e.g. 1
  • the parallelograms e.g. 10
  • the arrows indicate flows of information between the functional units.
  • the division of the functionality among the functional units is presented by way of example only.
  • the system may be implemented at least partly on a computer system. Such a computer system may be implemented as a standalone workstation which has preferably access to an online database.
  • the system can also be implemented on a server and can be provided with a web-based interface or a client-server based user interface. Other implementations are also possible.
  • the common elements of computer systems such as hard drive, keyboard, display, communications port, and the like, are known to the person skilled in the art and will not be described in further detail herein.
  • the system may comprise a user interface 1 for enabling one or more users to interact with the system.
  • This interface may be web-based or implemented in another suitable manner.
  • the user interface may have many other user interface elements and provide other functionalities which are not described herein. In this description, only those user interface elements are described which are necessary for a proper understanding of the techniques disclosed herein.
  • the user interface 1 may be arranged for enabling a user to indicate a topic 10 and a set of permissions 15 .
  • the user interface may display a list of topics in the form of textual or graphical representations (icons) representing different topics which may be the subject of access control, and enable the user to select one or more topics by clicking on or touching the textual or graphical representations.
  • the user may be presented with a text box in which the user is enabled to type a textual expression, such as one or more keywords or e.g. a phrase.
  • the topic 10 or topics thus obtained may be stored in a temporary memory and/or transmitted via a network to a computer system hosting the document analyzer 2 .
  • the set of permissions 15 may be indicated by the user in a similar way, e.g. by enabling the user to select one set of permissions from a list of representations of sets of permissions.
  • the user can be presented with a list of separate permissions and enabled to select one or more of the permissions shown for inclusion in or exclusion from the set of permissions.
  • the user may be enabled to enter the set of permissions in a textual form.
  • the user interface 1 may further be arranged for enabling the user to specify at least one user 16 to whom the set of permissions 15 are to be applied.
  • the at least one user 16 may be a single user, a plurality of specifically specified users, or a group of users. Such a group of users may be defined by their role or by institution, for example.
  • the user interface 1 may further be arranged for enabling the user to specify a plurality of pairs, each pair associating a set of permissions 15 with at least one user 16 . These permissions and user pairs may then be associated with a set of selected documents, as will be described hereinafter.
  • the system may further include a document analyzer 2 for analyzing the content of a plurality of documents 11 to find a set of documents 13 relating to the topic 10 .
  • a keyword may be searched in the documents, and all documents having the keyword may be included in the set of documents 13 .
  • the plurality of documents 11 may consist of all documents in an electronic health record stored in a patient database 14 . However, it is also possible that only the content of a subset of the documents in the electronic health record are analyzed.
  • the document analyzer may perform its task in several ways, which will be elucidated hereinafter.
  • the system may further include an associating subsystem 3 for associating the set of permissions 15 with the set of documents 13 .
  • the at least one user 16 to whom the set of permissions 15 is granted may be associated with the set of permissions 15 .
  • the access control policy 4 is generated.
  • a copy of the set of permissions 15 for each user 16 or user group is stored as a set of attributes with each document in the set of documents 13 , to form the access control policy 4 .
  • the generated tuples may be stored as an access control policy 4 , for example in the form of an access control matrix, a set of logical rules, or in XACML format.
  • Such formats in which the access control policy 4 may be represented and/or stored are known to the person skilled in the art per se.
  • the set of documents 13 may also be encrypted by the associating subsystem 3 , if the set of permissions so prescribes.
  • the document analyzer 2 may comprise a data type selector 8 for selecting at least one data type, based on the topic 10 .
  • This data type selector 8 may be integrated with the user interface 1 , for example in an embodiment in which the user interface 1 displays a list of data types from which the user may select.
  • the user may be enabled to indicate a topic 10 , which is translated by the data type selector 8 into one or more relevant data types.
  • This translation step may be based on information stored in an ontology such as SNOMED.
  • This translation, or mapping can be achieved directly or via a stemming step (known per se from e.g. Baeza-Yates et al., pg.
  • the mapping may be driven, for example, by the existing ontology (e.g., appropriate SNOMED codes) and/or using the database containing all the data types selected by other customers using the same keyword.
  • the data type selector 8 may also be arranged for searching documents containing the keyword, and selecting document types of the documents containing the keyword.
  • the user interface 1 may be configured for showing the automatically selected data types together with an example of a document of that data type, to enable the user to (de)select data types for further processing.
  • the document analyzer 2 may further comprise a document pre-selector 7 for selecting, based on the topic 10 , the plurality of documents 11 that are analyzed by the property finder 5 .
  • the document pre-selector 7 may be arranged for performing a keyword search of one or more keywords relating to the topic 10 .
  • the topic 10 may be represented by a keyword itself, and the document pre-selector 7 may be arranged for finding the documents which contain that keyword.
  • additional keywords may be found using an ontology, and documents containing these additional keywords may also be included in the plurality of documents.
  • the document pre-selector 7 may be arranged for selecting a plurality of documents 11 of the selected data type.
  • the document analyzer 2 may comprise a property finder 5 for analyzing the content of a plurality of documents 11 to find at least one distinguishing property 12 of documents relating to the topic 10 .
  • a distinguishing property 12 may be the presence of a particular keyword in the content and/or metadata of a document.
  • the plurality of documents 11 generated by the document pre-selector 7 have at least some content relating to the topic 10 , it may be possible to derive from that content properties of documents relating to the topic 10 .
  • AIDS is related to some particular medication, e.g. lamivudine, etravirine, tipranavir, and enfuvertide.
  • documents including the terms lamivudine, etravirine, tipranavir, and/or enfuvertide are a distinguishing property of documents relating to AIDS, because a third party may conclude that the patient has an AIDS related disease if he knows that these medications are prescribed.
  • Such a relation between a disease and corresponding medication may be already included in the ontology, but if not, such a relation can be derived from the plurality of documents 11 , as there will be some documents in which the diagnosis of a disease is coupled with a prescription of medication. Consequently, the system can learn such associations from the documents. More generally, this may be done using typical lexical and information retrieval algorithms:
  • the synonyms can be found in a general purpose dictionary, but also in a specific medical dictionary that covers medical terminology. Each synonym can be assigned a number representing its relevance with respect to the topic indicated by the consumer.
  • the most frequently used terms can be selected by using an information retrieval method, based on e.g. term frequency in a document and/or inverse document frequency. For example, number of documents containing the term, such as tf.idf, BM25, language models, see Baeza-Yates et al., Chapter 2: Modeling.
  • information on term proximity can be used for estimating the relevance of terms for the user, using techniques known from e.g. “Term Proximity Scoring for Keyword-Based Retrieval Systems” by Rasofolo, Y., & Savoy, J. in Advances in Information Retrieval (2003).
  • a list of keywords (and/or phrases) with the associated probability of relevance may be determined.
  • a relevant dictionary for example a medical dictionary that contains a medical database-specific stopword list and medical term statistics distribution. This step is useful because the term distribution in the medical reports might be significantly skewed in comparison to a general term distribution. As a result, a new relevance score for the top k terms may be determined. It is possible to continue only the l terms with the highest relevance, wherein l ⁇ k.
  • the k and l parameters mentioned above can be specified by the administrator, consumer, or empirically determined, for example.
  • the user interface 1 may be arranged for displaying the list of l additional keywords and enable the user to select the ones that he/she would like to include in the secondary search.
  • the relevance of each term should be displayed.
  • the selection of additional keywords is performed automatically and the keywords are forwarded to the document selector 6 without user interaction.
  • Distinguishing properties other than presence of keywords may also be supported, for example a more complex logical expression involving one or more keywords can be generated (e.g. presence of keyword A, but not keyword B), or properties relating to metadata or attributes of documents.
  • the at least one distinguishing property 12 may also comprise a data type.
  • the property finder 5 may be arranged for applying natural language processing and/or an information retrieval method to the content of the plurality of documents 11 .
  • the document analyzer 2 may further comprise a document selector 6 for selecting the set of documents 13 , based on the distinguishing property 12 .
  • a document selector 6 for selecting the set of documents 13 , based on the distinguishing property 12 .
  • the distinguishing property 12 is presence of a keyword
  • a keyword search may be performed on all documents in the electronic health record.
  • this logical expression may be evaluated for all documents in the electronic health record.
  • the document selector 6 may be arranged for performing the additional document search, based on the distinguishing property, for example the selected keywords, in a fashion of a query term expansion (see e.g. “Query Expansion”, by Efthimiadis, E. N., 1996, in: Annual Review of Information Systems and Technology (ARIST)).
  • This additional search may be performed using an information retrieval method that might be the same as or similar to the one used in the previous step. However, in this case the complete records may be evaluated based on the selected keywords, using an information retrieval method.
  • the top m records that are the most relevant to the selected keywords may be identified (where the degree of relevance is estimated). These records may be ranked in a descending order with respect to their relevance and, optionally, presented to the user for selection. Afterwards, the relevance of the records may be aggregated based on their association with data types. The list of top n data types may then be presented to the user in descending order. As in the previous step, the choice of m and n can be either empirically determined or pre-selected by a user. The user may be provided with the option to select which data types and/or records he would also like to add to the set of restricted data types. By selecting the data type, the automatic selection of records belonging to that data type can be realized, for example.
  • the user interface 1 may be arranged for displaying the set of documents 13 found by the document analyzer 2 .
  • the user interface may further be arranged for enabling the user to adapt the set of documents 13 to obtain an adapted set of documents 13 ′.
  • the associating subsystem 3 may be accordingly arranged for associating the set of permissions 15 with the adapted set of documents 13 ′.
  • the set of documents 13 is processed by the associating subsystem 3 without user intervention.
  • the user interface 1 may be arranged for enabling the user to make a change to the at least one distinguishing property 12 found by the property finder 5 , and the document selector 6 may be arranged for selecting the set of documents 13 , based on the modified distinguishing property 12 ′.
  • the system may further comprise an access control subsystem 9 arranged for being configured with the access control policy 4 obtained by the associating subsystem 3 .
  • the access control subsystem 9 may be arranged for enforcing the set of permissions 15 on the set of documents 13 and the at least one user 16 .
  • Such access control systems are known in the art per se and can be built by the skilled person in view of the present description.
  • FIG. 2 illustrates a similar system for generating an access control policy. Only the differences with the system of FIG. 1 are described here. Similar objects have been indicated in FIG. 2 using the same reference numerals.
  • the topic comprises a keyword 210 .
  • the document analyzer 202 is arranged for searching for the keyword 210 in the content of the documents 214 of an electronic health record, to obtain a plurality of documents 211 containing the keyword 210 .
  • the document analyzer 202 may be arranged for finding further keywords 212 , based on the content of the documents 211 containing the keyword 210 , in a way set forth elsewhere in this description, and for selecting the set of documents 13 , based on the further keywords 212 .
  • FIG. 3 shows a flowchart of a method of creating an access control policy.
  • the method may comprise a step 301 of enabling a user to indicate a topic and a set of permissions.
  • the method may proceed with a step 302 of analyzing the content of a plurality of documents to find a set of documents relating to the topic.
  • the method may proceed with a step 303 of associating the set of permissions with the set of documents to obtain an access control policy.
  • the method may terminate.
  • the user may be enabled to indicate a user or users whom are granted the set of permissions.
  • the association may be extended such that the set of permissions is associated with both the set of documents and the indicated user or users.
  • the methods and systems described herein may be implemented at least partially in software as a computer program product.
  • a subset of records (or documents) may be identified in the (consumer) EHRs/PHRs that contains information relating to a consumer-defined topic, e.g. a keyword. This may be done in three steps:
  • Direct mapping (based on ontology for example): identify the data types that contain the records (e.g. documents) relevant for the consumer privacy preference. Direct mapping may be established between a keyword (such as AIDS) specified by the user in his or her privacy preferences and the data types that contain relevant documents. This mapping can be for example based on an existing ontology (e.g., appropriate SNOMED codes). The data types and/or documents, which are identified to have a relation with the keyword specified by the user, are marked and access to them is restricted as specified in the consumer privacy preferences. It is also possible, for example, to perform a direct search for documents containing the keyword or a keyword relating to the user-specified keyword according to an existing ontology. This way, the step of selecting document types may be omitted.
  • a keyword such as AIDS
  • SNOMED codes existing ontology
  • additional keywords may be extracted from the relevant documents (or data types) identified in the first step.
  • a keyword could be a name of a medicine mentioned in one of the records directly mapped to the originally specified keyword.
  • Identification of extra records The rest of the records are searched using the user-defined keyword plus the extra keywords extracted in the second step. This enlists additional data types and/or records that the consumer can use to specify his/her privacy policy.
  • relevance of selected keywords, records, or data types may be calculated in each step and optionally presented on the display to help the user in specifying his/her privacy policy.
  • the threshold and/or top x entities may be fed back to the user to automate or speed-up the specification process.
  • the access control policy defined by the consumer is applied to the identified records.
  • the previous three steps may involve interaction with the user in all the steps for defining the security policies.
  • a subset or all of these steps can be automated, in particular when there is sufficient empirical evidence (of typical user policy selection profiles) and a large enough database of user privacy policies.
  • the specification of security policies would be realized with less interaction from the user and a smaller amount of information feed back during various steps.
  • the last step only the less relevant data types and most specific records can be shown, while the system will automatically include data types and records whose relevance is higher than the empirically determined threshold.
  • FIG. 4 shows a diagram with an overview of a context of a system 403 for generating an access policy.
  • Input to the system 403 is an electronic health record containing a plurality of documents 401 .
  • a further input to the system 403 is an ontology 402 .
  • the system 403 comprises a user interface 405 and a document analyzer 404 .
  • As illustrated tentatively by the arrows between the document analyzer 404 and the user interface 405 there may be three stages of interaction: a first indication of a topic by means of e.g. keywords; a first user selection of data types/documents proposed by the document analyzer 404 ; and a final user selection of data types/documents proposed by the document analyzer 404 .
  • the result 409 may comprise a mapping 408 from the original topic/keyword 406 onto a set of data types/documents 407 .
  • a set of permissions may be associated with the set of documents 407 .
  • These associations may be used in several ways, for example by a personal preference manager 409 to store the access control policy and/or the mapping 408 into a personal user profile for future use. This allows the user to more easily apply permissions to documents relating to that keyword.
  • An access control system 410 may be operated under control of the access control policy.
  • a machine learning component 411 may be operative to create general use mappings between keywords and data types/further keywords, based on the mapping 408 .
  • mappings 408 may be the result of mappings 408 produced by different users, and the knowledge incorporated therein may be used to improve the automatic portions of the document analyzer 403 , using machine learning techniques known in the art per se. This way, user interaction in the document analyzer 403 may be reduced or totally avoided.
  • FIG. 5 is a sketch of a user interface layout which may be generated by user interface 1 which enables a user to select from a number of data types and/or documents. Such an interface layout can be used to enable the user to make a selection in the different interactive steps of the access control policy creation process.
  • KWD the user-entered keyword or indicated topic may be shown.
  • DT 1 , DT 2 , . . . , DTm the different data types considered relevant for the keyword/topic may be shown.
  • R 1 _DT 1 , R 2 _DT 1 , . . . , Rn_DT 2 the documents of data type DT 1 are shown.
  • Rn_DT 2 the documents of data type DT 2 are shown.
  • R 1 _DTm, R 2 _DTm, . . . , Rn_DTm the documents of data type DTm are shown.
  • m data types are shown and n documents for each type. Note that the number of documents shown for each type does not need to be the same for each type.
  • a check box is shown which enables the user to select 501 or deselect 502 that particular data type or document for inclusion in the next processing step. Inclusion of a document type DT 2 , 501 generally means to automatically include all documents R 1 _DT 2 , R 2 _DT 2 , . . .
  • the invention also applies to computer programs, particularly computer programs on or in a carrier, adapted to put the invention into practice.
  • the program may be in the form of a source code, an object code, a code intermediate source and object code such as in a partially compiled form, or in any other form suitable for use in the implementation of the method according to the invention.
  • a program may have many different architectural designs.
  • a program code implementing the functionality of the method or system according to the invention may be sub-divided into one or more sub-routines. Many different ways of distributing the functionality among these sub-routines will be apparent to the skilled person.
  • the sub-routines may be stored together in one executable file to form a self-contained program.
  • Such an executable file may comprise computer-executable instructions, for example, processor instructions and/or interpreter instructions (e.g. Java interpreter instructions).
  • one or more or all of the sub-routines may be stored in at least one external library file and linked with a main program either statically or dynamically, e.g. at run-time.
  • the main program contains at least one call to at least one of the sub-routines.
  • the sub-routines may also comprise calls to each other.
  • An embodiment relating to a computer program product comprises computer-executable instructions corresponding to each processing step of at least one of the methods set forth herein. These instructions may be sub-divided into sub-routines and/or stored in one or more files that may be linked statically or dynamically.
  • Another embodiment relating to a computer program product comprises computer-executable instructions corresponding to each means of at least one of the systems and/or products set forth herein. These instructions may be sub-divided into sub-routines and/or stored in one or more files that may be linked statically or dynamically.
  • the carrier of a computer program may be any entity or device capable of carrying the program.
  • the carrier may include a storage medium, such as a ROM, for example, a CD ROM or a semiconductor ROM, or a magnetic recording medium, for example, a floppy disc or a hard disk.
  • the carrier may be a transmissible carrier such as an electric or optical signal, which may be conveyed via electric or optical cable or by radio or other means.
  • the carrier may be constituted by such a cable or other device or means.
  • the carrier may be an integrated circuit in which the program is embedded, the integrated circuit being adapted to perform, or to be used in the performance of, the relevant method.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Primary Health Care (AREA)
  • Epidemiology (AREA)
  • Public Health (AREA)
  • Storage Device Security (AREA)
  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Child & Adolescent Psychology (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A system for generating an access control policy comprises a user interface for enabling a user to indicate a topic and a set of permissions. A document analyzer analyzes the content of a plurality of documents to find a set of documents relating to the topic. A property finder analyzes the content of a plurality of documents to find at least one distinguishing property of documents relating to the topic. A document selector selects the set of documents, based on the distinguishing property. An associating subsystem associates the set of permissions with the set of documents to obtain an access control policy.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • The present application is a continuation of U.S. application Ser. No. 13/997,276, filed Jun. 24, 2013, which is the U.S. National Phase application under 35 U.S.C. § 371 of International Application No. PCT/IB2011/055669, filed Dec. 14, 2011, which claims the benefit of European Application No. 10196417.9, filed Dec. 22, 2010. These applications are hereby incorporated by reference herein.
  • FIELD OF THE INVENTION
  • The invention relates to creating an access control policy. The invention further relates to configuring an access control system with an access control policy.
  • BACKGROUND OF THE INVENTION
  • Electronic health records, as well as electronic personal health records, have been increasingly used to replace paper records in professional healthcare and home healthcare.
  • Informed consent is a very important process in professional healthcare, in which the patient makes some choices with respect to, inter alia, the use of his health data by healthcare providers. In many countries the patient has legal rights to hide or limit access to certain parts of his electronic healthcare records. For example, a patient may restrict access to documents relating to mental health or drug abuse, such that only the patient's psychiatrist has access to these documents. In another example, such restricted access prevents others from having access to a patient's records related to AIDS. Different security mechanisms have been developed to technologically facilitate this right, such as the use of sealed envelopes in the Spine system of NHS in the UK or a similar mechanism in the NICTIZ system in The Netherlands.
  • In the domain of personal health records, the patient is solely responsible for defining who has access to his records. Very often the patient has a desire to realize a very complex policy, especially in the case that the patient wants to give access to certain healthcare providers, family or friends. In some cases, the patient might want to block them from being able to access certain parts of his/her records.
  • HL-7, IHE and HITSP standardize interactions related to patient consent as well as formats in which consent can be specified. HL-7 specifies CDA R2 consent directive, while IHE developed Basic Privacy Patient consent profile. The privacy preference working group of HITSP collected requirements related to the patient privacy preferences in respect of health records. HL-7 also standardized vocabularies used for access control, such as an object vocabulary that describes different data types of electronic health records. These data types are used by the access control system, which assigns permissions/restrictions to different users with respect to these data types.
  • “Patient-centric authorization framework for sharing electronic health records”, Jing Jin et al., SACMAT'09, Jun. 3-5, 2009, Stresa, Italy, discloses a need for a secure, usable, and straightforward mechanism that allows users to quickly and easily authorize a variety of medical affiliates to access their sensitive records or a subset of the data within them. The paper discloses a model in which the semantics and structural composition of EHR documents is formulated in a hierarchical structure, where internal sub-objects are distinguished and associated with properties to address important criteria for medical data sharing such as data types, intended purposes and information sensitivities. Both the EHR instances and the aggregated virtual composite EHR are uniformly modelled as a labelled hierarchical structure. Relevant properties are categorized into three dimensions: origin, sensitivity, and object type.
  • SUMMARY OF THE INVENTION
  • It would be advantageous to have an improved system for creating an access control policy. To better address this concern, a first aspect of the invention provides a system comprising
  • a user interface for enabling a user to indicate a topic and a set of permissions;
  • a document analyzer for analyzing the content of a plurality of documents to find a set of documents relating to the topic; and
  • an associating subsystem for associating the set of permissions with the set of documents to obtain an access control policy.
  • Because the system takes into account the content of the plurality of documents, the system is able to more accurately determine the set of documents to which the user intends to apply the set of permissions. This may provide a better result than an approach which only takes into account the structure or a global classification of the documents or records. The user may be more confident that the topic is translated well into a set of documents which relate to the topic. Moreover, it becomes easier for the user to create a fine-grained access control policy, because the user is less concerned with any hierarchical structure in which documents are stored, and thus the user needs to know fewer details of the structure of the information system.
  • The document analyzer may comprise a property finder for analyzing the content of a plurality of documents to find at least one distinguishing property of documents relating to the topic. The document analyzer may further comprise a document selector for selecting the set of documents, based on the distinguishing property. The property finder helps to improve the selection of the relevant documents. By finding a distinguishing property of the documents relating to the topic, it becomes possible to select the set of documents by searching for documents having that property. By virtue of the analysis of the content of documents to find a distinguishing property, it is not necessary to define all possible properties of all possible topics beforehand, which would be a labor-intensive and error-prone job. Moreover, the property finder may give more reliable results in an environment where the topics and properties of documents relating thereto are subject to change. Moreover, in many cases, it is not feasible to define a general template for a specific topic, as each instance of records might be different. For example, it may be problematic to identify in advance all possible data types of an electronic health record in which information about AIDS in the case of a particular AIDS patient can be stored. Therefore a solution that can find them during runtime is preferred.
  • The document analyzer may comprise a document pre-selector for selecting the plurality of documents that are analyzed by the property finder, based on the topic. This helps to determine the plurality of documents. For example, the document pre-selector selects a plurality of documents relating to the topic. Such selection may be performed by matching of the document type with the topic, or by analyzing the content of documents and selecting documents whose content contains one or more words relating to the topic.
  • The document analyzer may comprise a data type selector for selecting at least one data type, based on the topic. The document pre-selector may be arranged for selecting a plurality of documents of the selected data type. This is an efficient way to find a plurality of documents which are suitable to find the at least one distinguishing property.
  • The user interface may be arranged for enabling the user to adapt the set of documents found by the document analyzer to obtain an adapted set of documents, and wherein the associating subsystem is arranged for associating the access control policy with the adapted set of documents. This allows the system to take into account fine-tuning choices made by the user. The system may be arranged for, based on the user-made choices, deriving further distinguishing properties or refining the distinguishing properties, based on machine learning techniques, to improve future uses of the system.
  • The user interface may be arranged for enabling the user to make a change to the at least one distinguishing property found by the property finder, and wherein the document selector is arranged for selecting the set of documents, based on the modified distinguishing property. This enables the user to refine the properties used to select the documents the user does not agree with, for example to correct a property found by the property finder. Such changes can be used to improve the algorithms used in the property finder in future uses, using a machine learning technique, for example.
  • The change may comprise the removal of one or more of the distinguishing properties from the at least one distinguishing property. For example, if a user thinks that one of the properties is not relevant for him, the user may simply remove that property, so that the removed property will not be used this time for selection of documents.
  • The topic may comprise a keyword. This allows the document analyzer to use string matching techniques to find the topic as a keyword occurring in a document. Alternatively, the topic may be represented by, for example, an icon which may be displayed on screen, enabling a user to select one of a plurality of graphical representations of topics, for example. Internally, the topic may be represented by a keyword in the system. A topic may also be represented by a collection of keywords, for example words which are synonyms or words which are semantically closely related to each other. The topic may also comprise a document type.
  • The document analyzer may be arranged for searching for the keyword in the content of the documents. This allows an efficient implementation of the document analyzer.
  • The document analyzer may be arranged for finding further keywords, based on the content of the documents containing the keywords, and for selecting the set of documents, based on the further keywords. This finding of further keywords may be based on a frequency analysis or on other information retrieval and/or natural language processing techniques, to find further keywords which are related to the keyword originally indicated by the user.
  • The at least one distinguishing property may comprise a data type or a keyword. These two kinds of properties are highly suitable to implement an accurate and/or efficient selection process.
  • The property finder may be arranged for applying natural language processing and/or an information retrieval method to the content of the plurality of documents. Such techniques, known in the art per se, may be applied to successfully find a distinguishing property.
  • The system may comprise an access control subsystem arranged for being configured with the access control policy obtained by the associating subsystem. The access control subsystem, configured with the access control policy, may enforce the access control in the way the user desires.
  • In another aspect, the invention provides a workstation comprising the system set forth.
  • In another aspect, the invention provides a method of creating an access control policy, comprising
  • creating an access control policy, comprising
  • enabling a user to indicate a topic and a set of permissions;
  • analyzing the content of a plurality of documents to find a set of documents relating to the topic; and
  • associating the set of permissions with the set of documents to obtain an access control policy.
  • In another aspect, the invention provides a computer program product comprising instructions for causing a processor system to perform the method set forth.
  • It will be appreciated by those skilled in the art that two or more of the above-mentioned embodiments, implementations, and/or aspects of the invention may be combined in any way deemed useful.
  • Modifications and variations of the workstation, the system, the method, and/or the computer program product, which correspond to the described modifications and variations of the system, can be carried out by a person skilled in the art on the basis of the present description.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • These and other aspects of the invention are apparent from and will be elucidated with reference to the embodiments described hereinafter. In the drawings,
  • FIG. 1 is a block diagram of a system for creating an access control policy with an access control system;
  • FIG. 2 is a block diagram of another system for creating an access control policy with an access control system;
  • FIG. 3 is a flowchart of a method of creating an access control policy;
  • FIG. 4 is a block diagram of an access control system including a system for creating an access control policy; and
  • FIG. 5 is a sketch of a user interface used for creating an access control policy.
  • DETAILED DESCRIPTION OF EMBODIMENTS
  • Information retrieval methods may be based on the term statistics in a collection of textual documents, i.e., using the number of term occurrences in a document (term frequency) and/or in a collection (collection frequency), and the number of documents containing a term. This is explained in Baeza-Yates, R., & Ribeiro-Neto, B. (1999). Modern Information Retrieval. Essex, UK: ACM Press (hereinafter: Baeza-Yates et al.). Besides information search, such statistical information, along with available ontologies, can be useful in helping the user to define various properties related to the data collection in question.
  • Consumers/patients usually have very high-level privacy preferences and are not familiar with the structure of electronic health records (EHRs) and object vocabularies used by EHR systems such as the one of HL-7 described above. They have difficulties in specifying their privacy policies and consent, as there is a large discrepancy between their preferences on the one hand and vocabularies used in access control systems on the other hand. Therefore, there is a need to translate their high-level preferences into machine-readable policies that constrain the use of their health data in a well-controlled, fine-grained manner.
  • For example, a patient/consumer may want to set up his/her preferences for his/her personal health record (PHR) imported from an electronic medical record from his/her hospital. For example, let us assume that he/she wants to share his/her record with several users, but wants to hide some information, such as the fact that he/she had a certain disease (e.g. a mental disorder, drug abuse, or AIDS). He/She does not want to review all his/her records in the database one by one and exclude and/or specify permissions for each instance of his/her records in the database that contain the sensitive information. It is neither sufficient to exclude particular data types, as the patient/consumer cannot anticipate all data types and records that might contain the sensitive information. Instead, the patient wants to convey to the IT system in an easy way that he/she wants to hide all the records related to the sensitive information, for example all records from which a third person could understand that the patient/consumer has AIDS. The patient/consumer would like the system to translate this high-level policy (e.g. a keyword, ‘AIDS’) into a machine-readable access control policy that defines permissions or restrictions at the level of the instances of data types (objects) specified by for example the HL-7 vocabulary. The access control policy generated by the system could be defined at the level of data types. However, it may also be defined at the level of instances of data objects, for example specifying permissions for individual documents. For example, an electronic health record may contain, among other data types, also the ‘prescription order’ data type, and the electronic health record may have several instances of this data type. It is possible that only one instance of the type ‘prescription order’ contains the sensitive information, e.g. information related to AIDS. Only this particular instance of the type ‘prescription order’ is associated with the special permissions relating to AIDS. The other instances of the type ‘prescription order’ may be associated with a set of permissions generally applying to instances of the type ‘prescription order’.
  • The system and method disclosed herein may be used to translate the consumer/patient input (privacy preference) into a machine-readable access control policy. The consumer input, i.e. privacy preferences, may be in the form of the tuple (user identifier, permission, keyword). For example the tuple (Doctor John Smith, Read, AIDS) would mean that Dr. John Smith can read the consumer's records related to AIDS. The machine-readable policy may be in the form of the tuple (user identifier, permission, data object identifier). The latter tuple would specify a data object to which a user has a particular permission. The techniques disclosed in this description may be used to map a keyword or topic specified by the patient into a set of objects in the electronic health record that contain information related to the keyword.
  • FIG. 1 illustrates aspects of a system for generating an access control policy. The rectangles (e.g. 1) denote functional units of the system. The parallelograms (e.g. 10) represent data items. The arrows indicate flows of information between the functional units. The division of the functionality among the functional units is presented by way of example only. The system may be implemented at least partly on a computer system. Such a computer system may be implemented as a standalone workstation which has preferably access to an online database. The system can also be implemented on a server and can be provided with a web-based interface or a client-server based user interface. Other implementations are also possible. The common elements of computer systems, such as hard drive, keyboard, display, communications port, and the like, are known to the person skilled in the art and will not be described in further detail herein.
  • The system may comprise a user interface 1 for enabling one or more users to interact with the system. This interface may be web-based or implemented in another suitable manner. The user interface may have many other user interface elements and provide other functionalities which are not described herein. In this description, only those user interface elements are described which are necessary for a proper understanding of the techniques disclosed herein. The user interface 1 may be arranged for enabling a user to indicate a topic 10 and a set of permissions 15. For example, the user interface may display a list of topics in the form of textual or graphical representations (icons) representing different topics which may be the subject of access control, and enable the user to select one or more topics by clicking on or touching the textual or graphical representations. Alternatively, the user may be presented with a text box in which the user is enabled to type a textual expression, such as one or more keywords or e.g. a phrase. The topic 10 or topics thus obtained may be stored in a temporary memory and/or transmitted via a network to a computer system hosting the document analyzer 2. The set of permissions 15 may be indicated by the user in a similar way, e.g. by enabling the user to select one set of permissions from a list of representations of sets of permissions. Alternatively, the user can be presented with a list of separate permissions and enabled to select one or more of the permissions shown for inclusion in or exclusion from the set of permissions. Alternatively, the user may be enabled to enter the set of permissions in a textual form. Examples of permissions are: permission to read, write, modify, create, delete, print, or forward. The user interface 1 may further be arranged for enabling the user to specify at least one user 16 to whom the set of permissions 15 are to be applied. For example, the at least one user 16 may be a single user, a plurality of specifically specified users, or a group of users. Such a group of users may be defined by their role or by institution, for example. The user interface 1 may further be arranged for enabling the user to specify a plurality of pairs, each pair associating a set of permissions 15 with at least one user 16. These permissions and user pairs may then be associated with a set of selected documents, as will be described hereinafter.
  • The system may further include a document analyzer 2 for analyzing the content of a plurality of documents 11 to find a set of documents 13 relating to the topic 10. For example, a keyword may be searched in the documents, and all documents having the keyword may be included in the set of documents 13. The plurality of documents 11 may consist of all documents in an electronic health record stored in a patient database 14. However, it is also possible that only the content of a subset of the documents in the electronic health record are analyzed. The document analyzer may perform its task in several ways, which will be elucidated hereinafter.
  • The system may further include an associating subsystem 3 for associating the set of permissions 15 with the set of documents 13. Moreover, the at least one user 16 to whom the set of permissions 15 is granted may be associated with the set of permissions 15. This way, the access control policy 4 is generated. The access control policy 4 may comprise a tuple (UID, P, OID)=(user ID, permission, object ID). Such a tuple specifies that a user identified by UID is granted permission P in respect of the object (e.g. a document or instance of a document type) identified by OID. For example, a copy of the set of permissions 15 for each user 16 or user group is stored as a set of attributes with each document in the set of documents 13, to form the access control policy 4. Alternatively, the generated tuples (UID, P, OID) may be stored as an access control policy 4, for example in the form of an access control matrix, a set of logical rules, or in XACML format. Such formats in which the access control policy 4 may be represented and/or stored are known to the person skilled in the art per se. The set of documents 13 may also be encrypted by the associating subsystem 3, if the set of permissions so prescribes.
  • The document analyzer 2 may comprise a data type selector 8 for selecting at least one data type, based on the topic 10. This data type selector 8 may be integrated with the user interface 1, for example in an embodiment in which the user interface 1 displays a list of data types from which the user may select. Alternatively, the user may be enabled to indicate a topic 10, which is translated by the data type selector 8 into one or more relevant data types. This translation step may be based on information stored in an ontology such as SNOMED. This translation, or mapping, can be achieved directly or via a stemming step (known per se from e.g. Baeza-Yates et al., pg. 168) to better handle a free keyword input, i.e., by matching only the word stem instead of the entire freely entered keyword. The mapping may be driven, for example, by the existing ontology (e.g., appropriate SNOMED codes) and/or using the database containing all the data types selected by other customers using the same keyword. The data type selector 8 may also be arranged for searching documents containing the keyword, and selecting document types of the documents containing the keyword. The user interface 1 may be configured for showing the automatically selected data types together with an example of a document of that data type, to enable the user to (de)select data types for further processing.
  • The document analyzer 2 may further comprise a document pre-selector 7 for selecting, based on the topic 10, the plurality of documents 11 that are analyzed by the property finder 5. For example, the document pre-selector 7 may be arranged for performing a keyword search of one or more keywords relating to the topic 10. For example, the topic 10 may be represented by a keyword itself, and the document pre-selector 7 may be arranged for finding the documents which contain that keyword. Also, additional keywords may be found using an ontology, and documents containing these additional keywords may also be included in the plurality of documents.
  • In the case that the system comprises the data type selector 8, the document pre-selector 7 may be arranged for selecting a plurality of documents 11 of the selected data type.
  • The document analyzer 2 may comprise a property finder 5 for analyzing the content of a plurality of documents 11 to find at least one distinguishing property 12 of documents relating to the topic 10. Such a distinguishing property 12 may be the presence of a particular keyword in the content and/or metadata of a document. As the plurality of documents 11 generated by the document pre-selector 7 have at least some content relating to the topic 10, it may be possible to derive from that content properties of documents relating to the topic 10. For example, AIDS is related to some particular medication, e.g. lamivudine, etravirine, tipranavir, and enfuvertide. Since these terms may appear in the plurality of documents 11, the system may conclude that documents including the terms lamivudine, etravirine, tipranavir, and/or enfuvertide are a distinguishing property of documents relating to AIDS, because a third party may conclude that the patient has an AIDS related disease if he knows that these medications are prescribed.
  • Such a relation between a disease and corresponding medication may be already included in the ontology, but if not, such a relation can be derived from the plurality of documents 11, as there will be some documents in which the diagnosis of a disease is coupled with a prescription of medication. Consequently, the system can learn such associations from the documents. More generally, this may be done using typical lexical and information retrieval algorithms:
  • Searching for synonyms of the keyword. The synonyms can be found in a general purpose dictionary, but also in a specific medical dictionary that covers medical terminology. Each synonym can be assigned a number representing its relevance with respect to the topic indicated by the consumer.
  • Searching for the most frequently used terms in the plurality of documents 11 selected by the document pre-selector 7. The most frequently used terms can be selected by using an information retrieval method, based on e.g. term frequency in a document and/or inverse document frequency. For example, number of documents containing the term, such as tf.idf, BM25, language models, see Baeza-Yates et al., Chapter 2: Modeling. In addition, information on term proximity (phrases) can be used for estimating the relevance of terms for the user, using techniques known from e.g. “Term Proximity Scoring for Keyword-Based Retrieval Systems” by Rasofolo, Y., & Savoy, J. in Advances in Information Retrieval (2003). As a result of this stage, a list of keywords (and/or phrases) with the associated probability of relevance may be determined.
  • Re-evaluation of the top k most relevant terms, using a relevant dictionary, for example a medical dictionary that contains a medical database-specific stopword list and medical term statistics distribution. This step is useful because the term distribution in the medical reports might be significantly skewed in comparison to a general term distribution. As a result, a new relevance score for the top k terms may be determined. It is possible to continue only the l terms with the highest relevance, wherein l<k.
  • The k and l parameters mentioned above can be specified by the administrator, consumer, or empirically determined, for example.
  • The user interface 1 may be arranged for displaying the list of l additional keywords and enable the user to select the ones that he/she would like to include in the secondary search. Optionally the relevance of each term should be displayed. Alternatively, the selection of additional keywords is performed automatically and the keywords are forwarded to the document selector 6 without user interaction.
  • Distinguishing properties other than presence of keywords may also be supported, for example a more complex logical expression involving one or more keywords can be generated (e.g. presence of keyword A, but not keyword B), or properties relating to metadata or attributes of documents. The at least one distinguishing property 12 may also comprise a data type. The property finder 5 may be arranged for applying natural language processing and/or an information retrieval method to the content of the plurality of documents 11.
  • The document analyzer 2 may further comprise a document selector 6 for selecting the set of documents 13, based on the distinguishing property 12. In the case that the distinguishing property 12 is presence of a keyword, a keyword search may be performed on all documents in the electronic health record. In the case of a logical expression, this logical expression may be evaluated for all documents in the electronic health record.
  • The document selector 6 may be arranged for performing the additional document search, based on the distinguishing property, for example the selected keywords, in a fashion of a query term expansion (see e.g. “Query Expansion”, by Efthimiadis, E. N., 1996, in: Annual Review of Information Systems and Technology (ARIST)). This additional search may be performed using an information retrieval method that might be the same as or similar to the one used in the previous step. However, in this case the complete records may be evaluated based on the selected keywords, using an information retrieval method.
  • First, the top m records that are the most relevant to the selected keywords may be identified (where the degree of relevance is estimated). These records may be ranked in a descending order with respect to their relevance and, optionally, presented to the user for selection. Afterwards, the relevance of the records may be aggregated based on their association with data types. The list of top n data types may then be presented to the user in descending order. As in the previous step, the choice of m and n can be either empirically determined or pre-selected by a user. The user may be provided with the option to select which data types and/or records he would also like to add to the set of restricted data types. By selecting the data type, the automatic selection of records belonging to that data type can be realized, for example.
  • The user interface 1 may be arranged for displaying the set of documents 13 found by the document analyzer 2. The user interface may further be arranged for enabling the user to adapt the set of documents 13 to obtain an adapted set of documents 13′. The associating subsystem 3 may be accordingly arranged for associating the set of permissions 15 with the adapted set of documents 13′. Alternatively, the set of documents 13 is processed by the associating subsystem 3 without user intervention.
  • As mentioned above, the user interface 1 may be arranged for enabling the user to make a change to the at least one distinguishing property 12 found by the property finder 5, and the document selector 6 may be arranged for selecting the set of documents 13, based on the modified distinguishing property 12′.
  • The system may further comprise an access control subsystem 9 arranged for being configured with the access control policy 4 obtained by the associating subsystem 3. The access control subsystem 9 may be arranged for enforcing the set of permissions 15 on the set of documents 13 and the at least one user 16. Such access control systems are known in the art per se and can be built by the skilled person in view of the present description.
  • FIG. 2 illustrates a similar system for generating an access control policy. Only the differences with the system of FIG. 1 are described here. Similar objects have been indicated in FIG. 2 using the same reference numerals. In the system of FIG. 2, the topic comprises a keyword 210. The document analyzer 202 is arranged for searching for the keyword 210 in the content of the documents 214 of an electronic health record, to obtain a plurality of documents 211 containing the keyword 210. The document analyzer 202 may be arranged for finding further keywords 212, based on the content of the documents 211 containing the keyword 210, in a way set forth elsewhere in this description, and for selecting the set of documents 13, based on the further keywords 212.
  • FIG. 3 shows a flowchart of a method of creating an access control policy. The method may comprise a step 301 of enabling a user to indicate a topic and a set of permissions. The method may proceed with a step 302 of analyzing the content of a plurality of documents to find a set of documents relating to the topic. The method may proceed with a step 303 of associating the set of permissions with the set of documents to obtain an access control policy. Here the method may terminate. Alternatively, the method may continue with a step 304 of enforcing access to the set of documents according to the associated set of permissions. Variations and extensions of the method can be carried out by the skilled person in view of the description of the system herein. For example, the user may be enabled to indicate a user or users whom are granted the set of permissions. In step 303, the association may be extended such that the set of permissions is associated with both the set of documents and the indicated user or users. The methods and systems described herein may be implemented at least partially in software as a computer program product.
  • A subset of records (or documents) may be identified in the (consumer) EHRs/PHRs that contains information relating to a consumer-defined topic, e.g. a keyword. This may be done in three steps:
  • Direct mapping (based on ontology for example): identify the data types that contain the records (e.g. documents) relevant for the consumer privacy preference. Direct mapping may be established between a keyword (such as AIDS) specified by the user in his or her privacy preferences and the data types that contain relevant documents. This mapping can be for example based on an existing ontology (e.g., appropriate SNOMED codes). The data types and/or documents, which are identified to have a relation with the keyword specified by the user, are marked and access to them is restricted as specified in the consumer privacy preferences. It is also possible, for example, to perform a direct search for documents containing the keyword or a keyword relating to the user-specified keyword according to an existing ontology. This way, the step of selecting document types may be omitted.
  • Extraction of extra keywords: In the second step additional keywords may be extracted from the relevant documents (or data types) identified in the first step. For example, a keyword could be a name of a medicine mentioned in one of the records directly mapped to the originally specified keyword.
  • Identification of extra records: The rest of the records are searched using the user-defined keyword plus the extra keywords extracted in the second step. This enlists additional data types and/or records that the consumer can use to specify his/her privacy policy.
  • In addition, relevance (confidence factor) of selected keywords, records, or data types may be calculated in each step and optionally presented on the display to help the user in specifying his/her privacy policy. The threshold and/or top x entities may be fed back to the user to automate or speed-up the specification process. The access control policy defined by the consumer is applied to the identified records.
  • Note that the previous three steps may involve interaction with the user in all the steps for defining the security policies. However, a subset or all of these steps can be automated, in particular when there is sufficient empirical evidence (of typical user policy selection profiles) and a large enough database of user privacy policies. In such a case, the specification of security policies would be realized with less interaction from the user and a smaller amount of information feed back during various steps. For example, in the last step, only the less relevant data types and most specific records can be shown, while the system will automatically include data types and records whose relevance is higher than the empirically determined threshold.
  • FIG. 4 shows a diagram with an overview of a context of a system 403 for generating an access policy. Input to the system 403 is an electronic health record containing a plurality of documents 401. A further input to the system 403 is an ontology 402. The system 403 comprises a user interface 405 and a document analyzer 404. As illustrated tentatively by the arrows between the document analyzer 404 and the user interface 405, there may be three stages of interaction: a first indication of a topic by means of e.g. keywords; a first user selection of data types/documents proposed by the document analyzer 404; and a final user selection of data types/documents proposed by the document analyzer 404. The result 409 may comprise a mapping 408 from the original topic/keyword 406 onto a set of data types/documents 407. To create an access control policy, a set of permissions may be associated with the set of documents 407. These associations may be used in several ways, for example by a personal preference manager 409 to store the access control policy and/or the mapping 408 into a personal user profile for future use. This allows the user to more easily apply permissions to documents relating to that keyword. An access control system 410 may be operated under control of the access control policy. A machine learning component 411 may be operative to create general use mappings between keywords and data types/further keywords, based on the mapping 408. These general-use mappings may be the result of mappings 408 produced by different users, and the knowledge incorporated therein may be used to improve the automatic portions of the document analyzer 403, using machine learning techniques known in the art per se. This way, user interaction in the document analyzer 403 may be reduced or totally avoided.
  • FIG. 5 is a sketch of a user interface layout which may be generated by user interface 1 which enables a user to select from a number of data types and/or documents. Such an interface layout can be used to enable the user to make a selection in the different interactive steps of the access control policy creation process. At KWD the user-entered keyword or indicated topic may be shown. At DT1, DT2, . . . , DTm, the different data types considered relevant for the keyword/topic may be shown. At R1_DT1, R2_DT1, . . . , Rn_DT2, the documents of data type DT1 are shown. At R1_DT2, R2_DT2, . . . , Rn_DT2, the documents of data type DT2 are shown. At R1_DTm, R2_DTm, . . . , Rn_DTm, the documents of data type DTm are shown. In this way, m data types are shown and n documents for each type. Note that the number of documents shown for each type does not need to be the same for each type. Next to each data type and document, a check box is shown which enables the user to select 501 or deselect 502 that particular data type or document for inclusion in the next processing step. Inclusion of a document type DT2, 501 generally means to automatically include all documents R1_DT2, R2_DT2, . . . , Rn_DT2 of that document type DT2. Such details can be taken care of in the user interface 1. It is possible to omit either the document types DT1, DT2, . . . , DTm or the individual documents Rx_DTy from the user interface in the case that input therefore is not expected at that particular point in the procedure.
  • It will be appreciated that the invention also applies to computer programs, particularly computer programs on or in a carrier, adapted to put the invention into practice. The program may be in the form of a source code, an object code, a code intermediate source and object code such as in a partially compiled form, or in any other form suitable for use in the implementation of the method according to the invention. It will also be appreciated that such a program may have many different architectural designs. For example, a program code implementing the functionality of the method or system according to the invention may be sub-divided into one or more sub-routines. Many different ways of distributing the functionality among these sub-routines will be apparent to the skilled person. The sub-routines may be stored together in one executable file to form a self-contained program. Such an executable file may comprise computer-executable instructions, for example, processor instructions and/or interpreter instructions (e.g. Java interpreter instructions). Alternatively, one or more or all of the sub-routines may be stored in at least one external library file and linked with a main program either statically or dynamically, e.g. at run-time. The main program contains at least one call to at least one of the sub-routines. The sub-routines may also comprise calls to each other. An embodiment relating to a computer program product comprises computer-executable instructions corresponding to each processing step of at least one of the methods set forth herein. These instructions may be sub-divided into sub-routines and/or stored in one or more files that may be linked statically or dynamically. Another embodiment relating to a computer program product comprises computer-executable instructions corresponding to each means of at least one of the systems and/or products set forth herein. These instructions may be sub-divided into sub-routines and/or stored in one or more files that may be linked statically or dynamically.
  • The carrier of a computer program may be any entity or device capable of carrying the program. For example, the carrier may include a storage medium, such as a ROM, for example, a CD ROM or a semiconductor ROM, or a magnetic recording medium, for example, a floppy disc or a hard disk. Furthermore, the carrier may be a transmissible carrier such as an electric or optical signal, which may be conveyed via electric or optical cable or by radio or other means. When the program is embodied in such a signal, the carrier may be constituted by such a cable or other device or means. Alternatively, the carrier may be an integrated circuit in which the program is embedded, the integrated circuit being adapted to perform, or to be used in the performance of, the relevant method.
  • It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design many alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. Use of the verb “comprise” and its conjugations does not exclude the presence of elements or steps other than those stated in a claim. The article “a” or “an” preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the device claim enumerating several means, several of these means may be embodied by one and the same item of hardware. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.

Claims (15)

1. A system for generating an access control policy, comprising
a user interface for enabling a user to indicate a topic and a set of permissions;
a document analyzer for analyzing the content of a plurality of documents to find a set of documents relating to the topic; and
an associating subsystem for associating the set of permissions with the set of documents to obtain an access control policy.
2. The system according to claim 1, wherein the document analyzer comprises
a property finder for analyzing the content of a plurality of documents to find at least one distinguishing property of documents relating to the topic; and
a document selector for selecting the set of documents, based on the distinguishing property.
3. The system according to claim 2, wherein the document analyzer comprises a document pre-selector for selecting, based on the topic, the plurality of documents that are analyzed by the property finder.
4. The system according to claim 3, wherein the document analyzer comprises a data type selector for selecting at least one data type, based on the topic; and
wherein the document pre-selector is arranged for selecting a plurality of documents of the selected data type.
5. The system according to claim 1, wherein the user interface is arranged for enabling the user to adapt the set of documents found by the document analyzer to obtain an adapted set of documents, and wherein the associating subsystem is arranged for associating the set of permissions with the adapted set of documents.
6. The system according to claim 2, wherein the user interface is arranged for enabling the user to make a change to the at least one distinguishing property found by the property finder, and wherein the document selector is arranged for selecting the set of documents, based on the modified distinguishing property.
7. The system according to claim 1, wherein the topic comprises a keyword.
8. The system according to claim 7, wherein the document analyzer is arranged for searching for the keyword in the content of the documents.
9. The system according to claim 8, wherein the document analyzer is arranged for finding further keywords, based on the content of the documents containing the keyword, and for selecting the set of documents, based on the further keywords.
10. The system according to claim 2, wherein the at least one distinguishing property comprises a data type or a keyword.
11. The system according to claim 2, wherein the property finder is arranged for applying natural language processing and/or an information retrieval method to the content of the plurality of documents.
12. The system according to claim 1, further comprising an access control subsystem arranged for being configured with the access control policy obtained by the associating subsystem.
13. A workstation comprising the system according to claim 1.
14. A method of creating an access control policy, comprising
enabling a user to indicate a topic and a set of permissions;
analyzing the content of a plurality of documents to find a set of documents relating to the topic; and
associating the set of permissions with the set of documents to obtain an access control policy.
15. A computer program product comprising instructions for causing a processor system to perform the method according to claim 14.
US15/865,525 2010-12-22 2018-01-09 Creating an access control policy based on consumer privacy preferences Abandoned US20180150651A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/865,525 US20180150651A1 (en) 2010-12-22 2018-01-09 Creating an access control policy based on consumer privacy preferences

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
EP10196417 2010-12-22
EP10196417.9 2010-12-22
PCT/IB2011/055669 WO2012085767A1 (en) 2010-12-22 2011-12-14 Creating an access control policy based on consumer privacy preferences
US201313997276A 2013-06-24 2013-06-24
US15/865,525 US20180150651A1 (en) 2010-12-22 2018-01-09 Creating an access control policy based on consumer privacy preferences

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
PCT/IB2011/055669 Continuation WO2012085767A1 (en) 2010-12-22 2011-12-14 Creating an access control policy based on consumer privacy preferences
US13/997,276 Continuation US9892279B2 (en) 2010-12-22 2011-12-14 Creating an access control policy based on consumer privacy preferences

Publications (1)

Publication Number Publication Date
US20180150651A1 true US20180150651A1 (en) 2018-05-31

Family

ID=45470617

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/997,276 Active 2032-08-15 US9892279B2 (en) 2010-12-22 2011-12-14 Creating an access control policy based on consumer privacy preferences
US15/865,525 Abandoned US20180150651A1 (en) 2010-12-22 2018-01-09 Creating an access control policy based on consumer privacy preferences

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/997,276 Active 2032-08-15 US9892279B2 (en) 2010-12-22 2011-12-14 Creating an access control policy based on consumer privacy preferences

Country Status (7)

Country Link
US (2) US9892279B2 (en)
EP (1) EP2656274B1 (en)
JP (1) JP6073802B2 (en)
CN (1) CN103329140B (en)
BR (1) BR112013015642A2 (en)
RU (1) RU2604677C2 (en)
WO (1) WO2012085767A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11501006B2 (en) 2018-03-05 2022-11-15 Hyundai Motor Company Leveraging natural language processing to refine access control within collections

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9384571B1 (en) * 2013-09-11 2016-07-05 Google Inc. Incremental updates to propagated social network labels
CN103745161B (en) * 2013-12-23 2016-08-24 东软集团股份有限公司 Access method of controlling security and device
US10515111B2 (en) 2016-01-19 2019-12-24 Regwez, Inc. Object stamping user interface
CN106021562B (en) * 2016-05-31 2019-05-24 北京京拍档科技有限公司 For electric business platform based on the relevant recommended method of theme
US10713390B2 (en) * 2017-07-17 2020-07-14 Microsoft Technology Licensing, Llc Removing sensitive content from documents while preserving their usefulness for subsequent processing
CN110232281B (en) * 2018-03-05 2023-07-04 现代自动车株式会社 Improved access control within a collection using natural language processing
US11736525B1 (en) 2020-06-17 2023-08-22 Amazon Technologies, Inc. Generating access control policies using static analysis
US20220012365A1 (en) * 2020-07-11 2022-01-13 AVAST Software s.r.o. System and method for differentiated privacy management of user content

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070112748A1 (en) * 2005-11-17 2007-05-17 International Business Machines Corporation System and method for using text analytics to identify a set of related documents from a source document
US20080104013A1 (en) * 2006-10-27 2008-05-01 Cerner Innovation, Inc. Query restriction for timely and efficient paging
US20080270386A1 (en) * 2007-04-27 2008-10-30 Hiroko Ohi Document retrieval system and document retrieval method
US20090055431A1 (en) * 2007-08-20 2009-02-26 International Business Machines Corporation Privacy ontology for identifying and classifying personally identifiable information and a related gui

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1018742A (en) 1996-06-28 1998-01-20 Yoshikawa:Kk Multipurpose stand
JP3566478B2 (en) * 1996-12-27 2004-09-15 キヤノン株式会社 Document security management system, document security management method, and document search device
CA2310075C (en) 1997-11-21 2008-08-26 Horst Froessl Document control and transmission system
JP3361743B2 (en) * 1998-05-08 2003-01-07 株式会社山武 Information browsing system
JP2001067323A (en) 1999-08-25 2001-03-16 Nippon Telegr & Teleph Corp <Ntt> Personal information distribution managing method, its device, recording medium in which personal information distribution management program is recorded, information service providing method, its device and recording medium in which information service providing program is recorded
US20040172307A1 (en) 2003-02-06 2004-09-02 Gruber Martin A. Electronic medical record method
US7549125B2 (en) * 2003-10-23 2009-06-16 Microsoft Corporation Information picker
US7428529B2 (en) 2004-04-15 2008-09-23 Microsoft Corporation Term suggestion for multi-sense query
US7533420B2 (en) * 2004-12-09 2009-05-12 Microsoft Corporation System and method for restricting user access to a network document
US20070150315A1 (en) * 2005-12-22 2007-06-28 International Business Machines Corporation Policy driven access to electronic healthcare records
US7243097B1 (en) * 2006-02-21 2007-07-10 International Business Machines Corporation Extending relational database systems to automatically enforce privacy policies
JP2007299093A (en) 2006-04-28 2007-11-15 Hitachi Software Eng Co Ltd Document management system
WO2008108158A1 (en) * 2007-03-02 2008-09-12 Nec Corporation Information disclosure control system, information disclosure control program, and information disclosure control method
JP5283859B2 (en) 2007-05-30 2013-09-04 株式会社東芝 Medical information display device
JP4968839B2 (en) 2007-08-20 2012-07-04 三菱電機株式会社 Ozone generator
US8458179B2 (en) 2007-11-29 2013-06-04 Palo Alto Research Center Incorporated Augmenting privacy policies with inference detection
JP4585565B2 (en) * 2007-12-18 2010-11-24 三菱電機インフォメーションシステムズ株式会社 Electronic medical record system
US8561100B2 (en) * 2008-07-25 2013-10-15 International Business Machines Corporation Using xpath and ontology engine in authorization control of assets and resources

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070112748A1 (en) * 2005-11-17 2007-05-17 International Business Machines Corporation System and method for using text analytics to identify a set of related documents from a source document
US20080104013A1 (en) * 2006-10-27 2008-05-01 Cerner Innovation, Inc. Query restriction for timely and efficient paging
US20080270386A1 (en) * 2007-04-27 2008-10-30 Hiroko Ohi Document retrieval system and document retrieval method
US20090055431A1 (en) * 2007-08-20 2009-02-26 International Business Machines Corporation Privacy ontology for identifying and classifying personally identifiable information and a related gui

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11501006B2 (en) 2018-03-05 2022-11-15 Hyundai Motor Company Leveraging natural language processing to refine access control within collections

Also Published As

Publication number Publication date
RU2013134143A (en) 2015-01-27
RU2604677C2 (en) 2016-12-10
JP6073802B2 (en) 2017-02-01
WO2012085767A1 (en) 2012-06-28
EP2656274B1 (en) 2019-03-06
US9892279B2 (en) 2018-02-13
CN103329140A (en) 2013-09-25
US20130312060A1 (en) 2013-11-21
JP2014506356A (en) 2014-03-13
BR112013015642A2 (en) 2016-10-11
CN103329140B (en) 2017-03-29
EP2656274A1 (en) 2013-10-30

Similar Documents

Publication Publication Date Title
US20180150651A1 (en) Creating an access control policy based on consumer privacy preferences
US11581070B2 (en) Electronic medical record summary and presentation
JP2021007031A (en) Automatic identification and extraction of medical condition and fact from electronic medical treatment record
US20100131498A1 (en) Automated healthcare information composition and query enhancement
US20080215570A1 (en) Medical literature database search tool
WO2013033427A2 (en) Medical information navigation engine (mine) system
Amato et al. Semantic processing of multimedia data for e-government applications
US10127271B2 (en) Generating a query
Sneiderman et al. Knowledge-based methods to help clinicians find answers in MEDLINE
Adamusiak et al. Next generation phenotyping using the unified medical language system
US20120166466A1 (en) Methods and apparatus for adaptive searching for healthcare information
Jonquet et al. A system for ontology-based annotation of biomedical data
Maté et al. Improving security in NoSQL document databases through model-driven modernization
Madaan et al. Domain specific multistage query language for medical document repositories
Sanchez-Graillet et al. An annotated corpus of clinical trial publications supporting schema-based relational information extraction
Song et al. Development of health information search engine based on metadata and ontology
Aggarwal et al. HEDEA: a Python tool for extracting and analysing semi-structured information from medical records
US20210272038A1 (en) Healthcare Decision Platform
Luna et al. Implementation of interinstitutional and transnational remote terminology services
Parvanova et al. A Web-based Platform to Share Harmonized Results from COVID-19 Clinical Studies
Yee et al. Big data: Its implications on healthcare and future steps
Straub et al. Evaluation of use of technologies to facilitate medical chart review
Sarker et al. Automated text summarisation and evidence-based medicine: A survey of two domains
US20230334076A1 (en) Determining Repair Information Via Automated Analysis Of Structured And Unstructured Repair Data
Lordick et al. Anonymization of Electronic Health Care Records: The EHR Anonymizer

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION