Summary Introduction The protocols developed by ITU-T E-Health protocol Architecture of e-Health X.th1 X.th2 to X.th6 Common Alerting Protocol Conclusion.

Slides:



Advertisements
Similar presentations
Web Services Architecture An interoperability architecture for the World Wide Service Network.
Advertisements

The benefits of using object identifiers for quantities and units in human physiology Jean-Paul Lemaire Associate Rapporteur of ITU-T SG 17/Q.9 (Telebiometrics)
Biometric Information Management For Security Phillip H. Griffin Griffin Consulting 1625 Glenwood Avenue Hayes Barton at Five Points Raleigh, North Carolina.
Siebel Web Services Siebel Web Services March, From
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Common Alerting Protocol (CAP) based Emergency Alerts using the Session Initiation Protocol (SIP) draft-ietf-ecrit-data-only-ea-02.
Mpeg-21 and Medical data A strategy for Tomorrow ’ s EMR.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Rev Common Alerting Protocol (CAP) v. 1.0 Emergency Management Technical Committee.
OSI Model MIS 416 – Module II Spring 2002 Networking and Computer Security.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
OSI Model.
What are the Future Applications of Real-Time Interpersonal Multimedia Telecommunications? Mike Maas COM 538 Fall 2004.
A brief introduction of Real Time Streaming Protocol
CS 522 WebServices -Sujeeth Narayan -Ankur Patwa.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
PART IX: EMERGENCY EXPOSURE SITUATIONS Module IX.1: Generic requirements for emergency exposure situations Lesson IX.1-2: General Requirements Lecture.
August 12, Meaningful Use *** UDOH Informatics Brown Bag Robert T Rolfs, MD, MPH.
QAD Pitch Report QAD EDI. Introduction to EDI … the transfer of structured data, by agreed messaging standards, from one computer system to another without.
Security and DICOM Lawrence Tarbox, Ph.D. Chair, DICOM Working Group 14 Siemens Corporate Research.
1 An Extensible Videoconference Tool for a Collaborative Computing Network Junjun He.
S/MIME and CMS Presentation for CSE712 By Yi Wen Instructor: Dr. Aidong Zhang.
Analysis of Alert Messages formats for Environmental Disaster Management 1 Raffaela Cefalo, Simone Maver, Claudia Paparini GeoSNAV Laboratory Department.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Presentation on Osi & TCP/IP MODEL
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Speaker:Yi-Jie Pan Advisor:Dr. Kai-Wei Ke 2014/04/28
Messaging & Web Services an Architectural View John Arnett, MSc Standards Modeller Information and Statistics Division NHSScotland Tel: (x2073)
Course ILT The OSI model Unit objectives Explain the significance of the OSI model, label the seven layers of the OSI model, and describe services provided.
User Needs Group (UNG) Status Report to the Commercial Mobile Service Alert Advisory Committee September 19, 2007 Gary K Jones, UNG Deputy Chair.
September, 2005What IHE Delivers 1 Cross-Enterprise Document Point-to-point Interchange (XDP) IHE Vendors Workshop 2006 IHE IT Infrastructure Education.
FYP: LYU0001 Wireless-based Mobile E-Commerce on the Web Supervisor: Prof. Michael R. Lyu By: Tony, Wat Hong Fai Harris, Yan Wai Keung.
 The use of telecommunications technology to provide, enhance, or expedite health care services.  Accessing off-site databases, linking clinics or physicians'
Health Management Information Systems
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
This material was developed by Oregon Health & Science University, funded by the Department of Health and Human Services, Office of the National Coordinator.
June 18, 2010 Marty Larson.  Health Information Exchange  Meaningful Use Objectives  Conclusion.
Presented February 21, 2006 at NOAA RSS, Podcast/Vodcast, Blog Workshop by Eliot Christian, United States Geological Survey Using RSS for Public Warnings.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Common Alerting Protocol (CAP) v. 1.0 Emergency Management Technical Committee.
October 7, 2009 SOCIAL SECURITY ADMINISTRATION-HIT SUPPORT Health IT Provider Registry IHE Proposal Overview Proposed Editor: Shanks Kande, Marty Prahl.
11 Restricting key use with XACML* for access control * Zack’-a-mul.
September, 2005What IHE Delivers 1 Cross-Enterprise Document Point-to-point Interchange (XDM) IHE Vendors Workshop 2006 IHE IT Infrastructure Education.
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
BEA position on W3C ‘Web Services’ Standards Jags Ramnarayan 11th April 2001.
N ETWORKING Standards and Protocols. S TANDARDS AND P ROTOCOLS The OSI Model.
OSI ARCHITECTURE IN OSI, ACTUAL INFORMATION IS OVERHEADED BY PROTOCOL LAYERS IF ALL SEVEN LAYERS ARE OVERHEADED, THEN AS LITTLE AS 15% OF THE TRANSMITTED.
IETF WG Presentation1 Urooj Rab Audio/Video Transport.
Emergency Data Exchange Language (EDXL) Internationally Available Free Standards Open and Non-Proprietary.
Emergency Data Exchange Language (EDXL) Internationally Available Free Standards Open and Non-Proprietary.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
Tung Tran, Ph.D. What is the EMR? Computerized legal medical record created by healthcare organizations Enables storage and retrieval of patient information.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 9 Web Services.
Dr.Roba AL-agha. Definition : The act of sending someone to another person or place for treatment, help, advice, etc. A referral is usually necessary.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
The ITU-T X.500 series and X.509 in a changing world
User Needs Group (UNG) Status Report to the Commercial Mobile Service Alert Advisory Committee September 19, 2007 Gary K Jones, UNG Deputy Chair.
ASN.1: Introduction Zdeněk Říha.
Presented By: Prof. D.W.Chadwick Other Author: D.Mundy
DSC.
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
MUMT611: Music Information Acquisition, Preservation, and Retrieval
Protocols 2 Key Revision Points.
Standards, Models and Language
Presentation transcript:

Summary Introduction The protocols developed by ITU-T E-Health protocol Architecture of e-Health X.th1 X.th2 to X.th6 Common Alerting Protocol Conclusion

Introduction E-Health is an area rich and complex, so safety is an essential element in this type of technology because of the sensitivity of the data transmitted. Standard X.th offers this possibility of data transport including safety.

The protocols developed by ITU-T Two protocols for e-Health and protection: E-Health protocol X.th series (X.th1 to X.th6). Common Alerting Protocol X.1303.

E-Health protocol The series of Recommendations contain: o X.th1: generic recommendation. o X.th2 to X.th6: specific recommendations.

Architecture of e-Health Well endowed clinic in an urban area with expertise Consultant / Surgeon Video, surgical manipulator Voice Local medical team (probably in a mobile van) in another country or rural area Medical support team Surgical equipments Voice Mobile / satellite

X.th1 The framework The protocol is open and extensible : o it contains several categories of exchange o it provides security with encryption and integrity of data.

Definition of objects Defines information object classes to defined objects associated to: Patients Observers Laboratories Medical devices Medical insurances Medical staff Pharmaceutical staff Drug manufacturers Medical software Data records (dental, DNA)

Open protocol Each data contains two elements: An ASN.1 object identifier The data itself

Definition of messages Three types of messages: Setup message Send-and-ack Interactive

Setup message Type of communication Security mechanisms Usage of voice and video channels

Send-and-ack session The sender sends a message containing E- Health data. The receiver replies with either: an acknowledgment or an error.

Interactive session It defines a dialog containing multiple steps. This type of session has been designed for remote interventions.

The security It is based on CMS (Cryptographic Message Syntax) which is provides: Integrity Encryption

CMS : normal and signed data id-data (OID) Data id-signedData (OID) Id-data (OID) Data signature

CMS : encrypted data and encrypted and signed data id-envelopedData (OID) id-signedData (OID) id-envelopedData (OID) Encrypted symmetric key Encrypted-data Encrypted symmetric key Encrypted data signature

Encoding of messages BER: Basic Encoding Rules PER: Packed Encoding Rules for narrow bandwidth XER: XML Encoding Rules

X.th2 to X.th6 X.th2: physics X.th3: chemistry X.th4: biology X.th5: culturology X.th6 psychology

Elements defined in specific parts Each part defines: Table of quantities, units and symbols. ASN.1 information objects for quantities, units, and symbols. Messages to transport the data.

Common Alerting Protocol Initially developed by OASIS (Organization for the Advancement of Structured Information Standards) in April 2004 using XML (CAP 1.0). In 2007, this protocol has been completed with ASN.1 definitions and adopted as an ITU-T Recommendation for CAP 1.1 (X.1303).

Common Alerting Protocol CAP is a protocol for alerting people for various events. It is open and can be adapted by definition of profiles for local needs. It is compatible with emerging technology of data transmission. Compatible with encryption and signature. Support of images and audio data.

Main information of a CAP alert A CAP message may contain four categories for information: Identification parameters Information parameters Area parameters Resource parameters.

Identification and information parameters The identification parameters specify: identification of the message sender date time alert status (actual, exercise, test,etc) alert type (alert, acknowledgement, etc) The information parameters describe the event: category: fire, health, safety, etc. event: in human-readable text responseType: action needed (for example evacuate) urgency (expected, future, etc) severity (extreme, minor, moderate, etc) certainty (likely, possible, etc)

Area and resource parameters The area parameters specify the geographical area concerned by the alert which can be defined by: a polygon a circle an altitude A maximum altitude (ceiling). The information resources allow addition of more information: files URI.

Message encoding The ASN.1 module contains in ITU-T X.1303 can be used with any standard encoding rules. Two encoding rules are particularly used: XER (XML encoding rules): to be compatible with XML applications. PER (Packed encoding rules): useful for networks using narrow bandwidth.

Conclusion The protocols developed in ITU-T are appropriate for Radioactivity safety and security situations: CAP can be used to alert population of the situation and actions to be taken. E-Health allows remote tests and diagnostics and also remote prescriptions.