137
Views
18
CrossRef citations to date
0
Altmetric
Original Article

Emergency healthcare process automation using workflow technology and web services

, &
Pages 195-207 | Received 01 Apr 2003, Published online: 12 Jul 2009

References

  • ANANTHARAMAN, V. and HAN, L., 2001, Hospital and emergency ambulance link: IT to enhance emergency pre-hospital care. International Journal of Medical Informatics, 61, 147– 161.
  • APSHANKAR, K., SADHWANI, D., SAMTANI, G., SIDDIQUI, B., CLARK,M., FLETCHER, P., HANSON, J., IRANI, R., WATERHOUSE, M. and ZHANG, L., 2002, Web Services Business Strategies and Architectures, (Chicago, USA: Expert Press).
  • RITONJA, A. and HOCEVAR, Z., 2001, Redesign of healthcare processes classification to improve the processes of gathering information and data processing on professional and organisational quality in healthcare. International Journal of Health Care Quality, 14(6), 254– 259.
  • HANSEN, M., MADNICK, S. and SIEGEL, M., 2002, Process aggregation using web services. Lecture Notes in Computer Science 2002, Ch. Bussler (ed.), 12 – 27.
  • LAMBROS, P., SCHMINT, M.-T. and ZENTNER, C., 2001, Combine business process management technology and business services to implement complex web services. IBM Corporation 2001. Available from URL http://www-3.ibm.com/ software/solutions/webservices/pdf/BPM.pdf.
  • LEYMANN, F., ROLLER, D. and SCHMINT, M.-T., 2002, Web services and business process management. IBM Systems Journal, 41(2), 198– 211.
  • PAPAZOGLOU, M. and YANG, J., 2002, Design methodlogy for web services and business processes. Lectures Notes in Computer Science 2002, A. Bunchmann (ed.), 54 – 64.
  • LEYMANN, F., 2001, Web services flow language. IBM Corporation 2001. Available from URL http://www-3.ibm.com/software/solutions/webservices/ pdf/WSFL.pdf.
  • KIM, Y., KANG, S. H. and KIM, D., 2000, WW-FLOW: Web-based workflow management with runtime encapsulation. IEEE Internet Computing 2000.
  • OBA, M. and KOMODA, N., 2001, Multiple type workflow model for enterprise application integration. Proceedings of the 34th Hawaii International Conference on System Sciences, Hawaii, USA.
  • YU-CHUAN LI, HSU-SUNG KUO, WEN-SHAN JIAN, DAH-DIAN TANG, CHIEN-TSAI LIU, LI LIU, CHIEN-YEH HSU, YONG-KOK TAN and CHUNG-HONG HU, 2001, Building a generic architecture for medical information exchange among healthcare providers. International Journal of Medical Informatics, 61(2 – 3), 241 – 246.
  • KINDLER, E., MARTENS, A. and REISIG, W., 2000, Inter-operability of workflow applications: Local criteria for global soundness. In Business Process Management: Models, Techniques, and Empirical Studies, Lecture Notes in Computer Science 2000, edited by W. M. P. van der Aalst, J. Desel and A. Oberweis (Berlin: Springer-Verlag), pp. 235 – 253.
  • BAKER, S., 2002, Web services and CORBA. Lectures Notes in Computer Science 2002, 2172, 618 – 632, Springer-Verlag, Berlin.
  • GILLMANN, M., HERTEL, J., JUNG, C., KAUFMANN, G. and WOLBER, M., 2002, Cooking the web- ERP: A practical recipe to stir-up monolithic enterprise information systems using DOM- and XML-standards. Lectures Notes in Computer Science 2002, 2519, 602 – 617, Springer-Verlag, Berlin.
  • O’NEIL, M., 2003, Architecting security for web services. Available from URL http://www.fawcette. com/javapro/2003_08/magazine/features/moneill/default_pf.asp.
  • SCHADOW, G., RUSSLER, D. C. and MCDONALD, J., 2001, Conceptual alignment of electronic health record data with guideline and workflow knowledge. International Journal of Medical Informatics, 64(2 – 3), 259 – 274.
  • MALAMATENIOU, F., VASSILACOPOULOS, G. and TSANAKAS, P., 1998, A workflow-based approach to virtual patient record security. IEEE Transactions on Information Technology in Biomedicine, 2, 139– 145.
  • MARUSTER, L., VAN DER AALST, W. M. P., WEIJTERS, T., VAN DEN BOSCH, A. and DAELEMANS, W., 2001, Automated discovery of workflow models from hospital data. In Krse, B. et al. (ed.), Proceedings 13th Belgium -Netherlands Conference on Artificial Intelligence (BNAIC’01) 2001, Amsterdam, The Netherlands, 183 – 190.
  • BARTHELL, E. and PEMBLE, K., 2003, The National Emergency Medical Extranet Project. Journal of Emergency Medicine, 24(1), 95– 100.
  • JUNG, B., ANDERSEN, E. and GRIMSON, J., 2000, Using XML for seamless integration of distributed electronic patient records. Proceedings of XML Scandinavia, Sweden, Gothenburg.
  • Oracle9i XML DataBase Developer’s Guide – Oracle XML DB. Available from URL http://otn.oracle. com/docs/products/oracle9i/doc_library/release2/appdev.920/ a96620/toc.htm.
  • MOSES, F., 2001, Clinical record use cases. Available from URL http://www.oasis-open.org/committees/ xacml/repository/draft-xacml-usecase-01.pdf.
  • IBM introduces new WebSphere business integration solution to help healthcare and insurance companies achieve HIPAA readiness. 2002, Available from URL http://www-1.ibm.com/industries/ healthcare/doc/content/news/pressrelease/ 330754105.html.
  • SAML SPECIFICATION. 2001, Available from URL http://xml.coverpages.org/ draft-sstc-ftf3-samlspec- 00.pdf.
  • ATKINSON, B., DELLA-LIBERA, G., HADA, S., HONDO, M., HALLAM-BAKER, P., KLEIN, J., LAMACCHIA, B., LEACH, P., MANFERDELLI, J., MARUYAMA, H., NADALIN, A., NAGARATNAM, N., PRAFULLCHANDRA, H., SHEWCHUK, J. and SIMON, D., 2002, Specification: Wes services security (WS-security), Eds. Kaler C., Available from URL http://www-106.ibm.com/developerworks/library/ ws-secure/.
  • KUDO, M. and HADA, S., 2000, XML Document security based on provisional authorization. Proceedings of the 7th ACM Conference on Computer and Communications Security 2000, 87 – 96.
  • AHN, G.-J., SANDHU, R., KANG, M. and PARK, J., 2000, Injecting RBAC to secure a web-based workflow system. In Proceedings of 5th ACM Workshop on Role-Based Access Control. ACM, Berlin, Germany 2000.
  • CASTANO, S., CASATI, F. and FUGINI, M., 2001, Managing workflow authorization constraints through active database technology. Information Systems Frontiers, 3(3), 319– 338.
  • DAMIANI, E., VIMERCATI, S., PARABOSCHI, S. and SAMARATI, P., 2002, A fine-grained access control system for XML documents. ACM Transactions on Information Systems 2002, 5(2), 169– 202.
  • KANG, M., PARK, J. and FROSCHER, J., 2001, Access control mechanisms for inter-organizational workflow. In Sixth ACM Symposium on Access Control Models and Technologies 2001.
  • WU, S., SHETH, A., MILLER, J. and LUO, Z., 2002, Authorization and access control of application data in workflow systems. Journal of Intelligent Information Systems, 18(1), 71– 94.
  • OH, S. and PARK, S., 2000, Task-role based access control (T-RBAC): An improved access control model for enterprise environment. Lecture Notes in Computer Science 2000, 1873, 264– 273.
  • DAMIANI, E., VIMERCATI, S., PARABOSCHI, S. and SAMARATI, P., 2001, A fine-grained access control for SOAP e-services. ACM Transactions on Information Systems 2001, Proceedings of the tenth international conference on World Wide Web, 504 – 513.
  • HONDO, M., NAGARATNAM, N. and NADALIN, A., 2002, Securing web services. IBM Systems Journal, 41(2), 228– 241.
  • HADA, S. and KUDO, M., 2000, XML access control language: Provisional authorization for XML documents. Tokyo research laboratory, IBM research, Available from URL http://www.trl.ibm.- co.jp/projects/xml/xacl/xacl-spec.html.
  • LARMAN, C., Applying UML patterns: An introduction to object oriented analysis and design and the unified process. Book 2001, Prentice Hall PTR; 2nd edition, ISBN: 0130925691.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.