A method and validation for auditing e-Health applications based on reusable software security requirements specifications

IF 3.7 2区 医学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS International Journal of Medical Informatics Pub Date : 2024-11-10 DOI:10.1016/j.ijmedinf.2024.105699
Carlos M. Mejía-Granda, José L. Fernández-Alemán, Juan M. Carrillo de Gea, José A. García-Berná
{"title":"A method and validation for auditing e-Health applications based on reusable software security requirements specifications","authors":"Carlos M. Mejía-Granda,&nbsp;José L. Fernández-Alemán,&nbsp;Juan M. Carrillo de Gea,&nbsp;José A. García-Berná","doi":"10.1016/j.ijmedinf.2024.105699","DOIUrl":null,"url":null,"abstract":"<div><h3>Objective</h3><div>This article deals with the complex process of obtaining security requirements for e-Health applications. It introduces a tailored audit and validation methodology particularly designed for e-Health applications. Additionally, it presents a comprehensive security catalog derived from primary sources such as law, guides, standards, best practices, and a systematic literature review. This catalog is characterized by its continuous improvement, clarity, completeness, consistency, verifiability, modifiability, and traceability.</div></div><div><h3>Methods</h3><div>The authors reviewed electronic health security literature and gathered primary sources of law, guides, standards, and best practices. They organized the catalog according to the ISO/IEC/IEEE 29148:2018 standard and proposed a methodology to ensure its reusability. Moreover, the authors proposed SEC-AM as an audit method. The applicability of the catalog was validated through the audit method, which was conducted on a prominent medical application, OpenEMR.</div></div><div><h3>Results</h3><div>The proposed method and validation for auditing e-Health Applications through the catalog provided a comprehensive framework for developing or evaluating new applications. Through the audit of OpenEMR, several security vulnerabilities were identified, such as DDOs, XSS, JSONi, and CMDi, resulting in a “Secure” classification of OpenEMR with a compliance rate of 66.97%.</div></div><div><h3>Conclusion</h3><div>The study demonstrates the proposed catalog’s feasibility and effectiveness in enhancing health software security. The authors suggest continuous improvement by incorporating new regulations, knowledge from additional sources, and addressing emerging zero-day vulnerabilities. This approach is crucial for providing practical, safe, and quality medical care amidst increasing cyber threats in the healthcare industry.</div></div>","PeriodicalId":54950,"journal":{"name":"International Journal of Medical Informatics","volume":"194 ","pages":"Article 105699"},"PeriodicalIF":3.7000,"publicationDate":"2024-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Medical Informatics","FirstCategoryId":"3","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1386505624003629","RegionNum":2,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Objective

This article deals with the complex process of obtaining security requirements for e-Health applications. It introduces a tailored audit and validation methodology particularly designed for e-Health applications. Additionally, it presents a comprehensive security catalog derived from primary sources such as law, guides, standards, best practices, and a systematic literature review. This catalog is characterized by its continuous improvement, clarity, completeness, consistency, verifiability, modifiability, and traceability.

Methods

The authors reviewed electronic health security literature and gathered primary sources of law, guides, standards, and best practices. They organized the catalog according to the ISO/IEC/IEEE 29148:2018 standard and proposed a methodology to ensure its reusability. Moreover, the authors proposed SEC-AM as an audit method. The applicability of the catalog was validated through the audit method, which was conducted on a prominent medical application, OpenEMR.

Results

The proposed method and validation for auditing e-Health Applications through the catalog provided a comprehensive framework for developing or evaluating new applications. Through the audit of OpenEMR, several security vulnerabilities were identified, such as DDOs, XSS, JSONi, and CMDi, resulting in a “Secure” classification of OpenEMR with a compliance rate of 66.97%.

Conclusion

The study demonstrates the proposed catalog’s feasibility and effectiveness in enhancing health software security. The authors suggest continuous improvement by incorporating new regulations, knowledge from additional sources, and addressing emerging zero-day vulnerabilities. This approach is crucial for providing practical, safe, and quality medical care amidst increasing cyber threats in the healthcare industry.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于可重复使用的软件安全要求规范的电子医疗应用程序审计方法和验证
本文论述了获取电子医疗应用程序安全要求的复杂过程。文章介绍了专门为电子医疗应用程序设计的审计和验证方法。此外,文章还介绍了从法律、指南、标准、最佳实践等主要来源和系统文献综述中得出的综合安全目录。该目录的特点是持续改进、清晰、完整、一致、可验证、可修改和可追溯。方法作者回顾了电子医疗安全文献,收集了法律、指南、标准和最佳实践等主要来源。他们根据 ISO/IEC/IEEE 29148:2018 标准整理了目录,并提出了确保其可重用性的方法。此外,作者还提出了 SEC-AM 作为审计方法。结果提出的通过目录审核电子医疗应用程序的方法和验证为开发或评估新应用程序提供了一个全面的框架。通过对 OpenEMR 的审计,发现了几个安全漏洞,如 DDOs、XSS、JSONi 和 CMDi,结果 OpenEMR 被归类为 "安全",符合率为 66.97%。作者建议通过纳入新法规、其他来源的知识和解决新出现的零日漏洞来不断改进。这种方法对于在医疗行业网络威胁不断增加的情况下提供实用、安全和优质的医疗服务至关重要。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Medical Informatics
International Journal of Medical Informatics 医学-计算机:信息系统
CiteScore
8.90
自引率
4.10%
发文量
217
审稿时长
42 days
期刊介绍: International Journal of Medical Informatics provides an international medium for dissemination of original results and interpretative reviews concerning the field of medical informatics. The Journal emphasizes the evaluation of systems in healthcare settings. The scope of journal covers: Information systems, including national or international registration systems, hospital information systems, departmental and/or physician''s office systems, document handling systems, electronic medical record systems, standardization, systems integration etc.; Computer-aided medical decision support systems using heuristic, algorithmic and/or statistical methods as exemplified in decision theory, protocol development, artificial intelligence, etc. Educational computer based programs pertaining to medical informatics or medicine in general; Organizational, economic, social, clinical impact, ethical and cost-benefit aspects of IT applications in health care.
期刊最新文献
Editorial Board Analysis of missing data in electronic health records of people with diabetes in primary care in Spain: A population-based cohort study What information do patients pay more attention to in online physician selection? Information needs model for online medical choice decision-making based on trust theory and fuzzy decision Systematic construction of composite radiation therapy dataset using automated data pipeline for prognosis prediction Perceptions of healthcare professionals and patients with cardiovascular diseases on mHealth lifestyle apps: A qualitative study
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1