Thomas Schabetsberger
Health Net
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Thomas Schabetsberger.
International Journal of Medical Informatics | 2007
Florian Wozak; Thomas Schabetsberger; Elske Ammmenwerth
The interconnection of medical networks in different healthcare institutions will be constantly increasing over the next few years, which will require concepts for securing medical data during transfer, since transmitting patient related data via potentially insecure public networks is considered a violation of data privacy. The aim of our work was to develop a model-based approach towards end-to-end security which is defined as continuous security from point of origin to point of destination in a communication process. We show that end-to-end security must be seen as a holistic security concept, which comprises the following three major parts: authentication and access control, transport security, as well as system security. For integration into existing security infrastructures abuse case models were used, which extend UML use cases, by elements necessary to describe abusive interactions. Abuse case models can be constructed for each part mentioned above, allowing for potential security risks in communication from point of origin to point of destination to be identified and counteractive measures to be directly derived from the abuse case models. The model-based approach is a guideline to continuous risk assessment and improvement of end-to-end security in medical networks. Validity and relevance to practice will be systematically evaluated using close-to-reality test networks as well as in production environments.
electronic healthcare | 2008
Basel Katt; Ruth Breu; Micahel Hafner; Thomas Schabetsberger; Richard Mair; Florian Wozak
Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.
electronic healthcare | 2011
Thomas Trojer; Basel Katt; Thomas Schabetsberger; Richard Mair; Ruth Breu
Discussions about appropriate security controls to protect medical records led to the understanding that the patient her-/himself plays a crucial role in networked electronic health-care. Patients have individual privacy concerns and may want to execute their personal right of self-determination on access and usage of their medical records. The ability for patients to have control over their personal medical data is the essence of patient-centric networked electronic health-care, but poses challenges regarding its tool support. Since patients can be generally treated as non-security experts as well as non-health-care domain experts, usability-supporting factors of authoring tools for privacy preferences have to receive major attention by implementers. Additionally, domain characteristics have to influence the design of such authoring applications. Finally expressed privacy preferences have to be analysed to inform the patient-author and guide her/him in the policy authoring process. In this paper we discuss the process of authorization policy authoring for shared electronic health records which we use to implement patient-controlled access control authoring tools. Further a use-case in the context of a specific health-care infrastructure is presented.
electronic healthcare | 2010
Thomas Trojer; Basel Katt; Florian Wozak; Thomas Schabetsberger
Traditionally, the definition and the maintenance of security and access control policies has been the exclusive task of system administrators or security officers. In modern distributed and heterogeneous systems, there exist the need to allow different stakeholders to create and edit their security and access control preferences. In order to solve this problem two main challenges need to be met. First, authoring tools with different user interfaces should be designed and adapted to meet domain background and the degree of expertise of each stakeholder. For example, policy authoring tools for a patient or a doctor should be user friendly and not contain any technical details, while those for a security administrators can be more sophisticated, containing more details. Second, conflicts that can arise among security policies defined by different stakeholders must be considered by these authoring tools on runtime. Furthermore, warnings and assisting messages must be provided to help defining correct policies and to avoid potential security risks. Towards meeting these challenges, we propose an authoring framework for security policies. This framework enables building authoring tools that take into consideration the views of different stakeholders.
hawaii international conference on system sciences | 2014
Thomas Trojer; Basel Katt; Tülay Özata; Ruth Breu; Patrick Mangesius; Thomas Schabetsberger
Information systems in electronic healthcare have the potential to support a variety of medical stakeholders in performing their regular daily working activities. Still with the growing amount of electronically available health-related data on patients, aspects of data privacy have to be considered, e.g., by improving the transparency of healthcare processes or by offering methods to allow patients to self-determine controls for their data. In this work we present the results of a study we conducted in Austria about the general desire of patients to self-control access to their health records as well as to elicit typical factors for access control they personally consider as important. The results we present in this work are intended to support the requirements analysis and development of patient-centric healthcare management applications. As our results clearly indicate that patients have varying conceptions regarding privacy we also elaborate on the proper integration of access control factors to satisfy individual informational requirements.
International Journal of Medical Informatics | 2006
Thomas Schabetsberger; Elske Ammenwerth; Stefan Andreatta; Gordon Gratl; Reinhold Haux; Georg Lechleitner; Klaus Schindelwig; Christian Stark; R. Vogl; Immanuel Wilhelmy; Florian Wozak
medical informatics europe | 2008
Florian Wozak; Elske Ammenwerth; Alexander Hörbst; Peter Sögner; Richard Mair; Thomas Schabetsberger
international health informatics symposium | 2012
Thomas Trojer; Basel Katt; Thomas Schabetsberger; Ruth Breu; Richard Mair
Studies in health technology and informatics | 2010
Thomas Schabetsberger; Florian Wozak; Basel Katt; Richard Mair; Bernhard Hirsch; Alexander Hörbst
Wiener Klinische Wochenschrift | 2009
S. Reitter; Werner Streif; Thomas Schabetsberger; Florian Wozak; Hubert K. Hartl; Christoph Male; Wolfgang Muntean; Ingrid Pabinger