Access control based on roles and groups: Case study Building a secure Smart Hospital using BPMS

被引:0
|
作者
Asma, Daassa [1 ]
Mohsen, Machhout [2 ]
Ghannouchi, Sonia Ayachi [3 ,4 ]
Taoufik, Aguili [5 ]
机构
[1] Univ Tunis El Manar, Fac Sci Monastir, Elect & Microelect Lab, Natl Engn Sch Tunis, Tunis, Tunisia
[2] Univ Monastir, Elect & Microelect Lab, Fac Sci, Monastir, Tunisia
[3] Univ Sousse, ISG Sousse, Sousse, Tunisia
[4] Univ Mannouba, RIADI Lab, ENSI, Mannouba, Tunisia
[5] Univ Tunis El Manar, Dept Informat & Commun Technol, SYSCOM Lab, Natl Engn Sch Tunis, Tunis, Tunisia
关键词
Process Security; Process Management (BPM); SecureBPMN; smart hospital; access control; SYSTEM;
D O I
10.1109/ATSIP62566.2024.10638848
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In today's e-health applications, controlling access to patients' medical information is a real concern. In particular, the control of access has been identified as one of the requirements for the security of these systems. In a BPMS, this security requirement is not adequately addressed: it is represented by a simple actor filter where a task is performed by a particular user. However, to ensure the confidentiality of the data used in each task, this is not sufficient. This research paper explores the idea of integrating an access control filter into a BPMS, specifically the Bonita BPMS. A case study is performed for the validation of this idea. More specifically, the COVID-19 healthcare process of a Tunisian hospital is taken into account, for which we have been able to apply the proposed solution by implementing this process in Bonita and providing real-time access control based on groups and roles. This article explores the access control in a BPMS for smart hospitals. We address the problem of access control of personal information of patients and doctors by using a BPMS systems, in the Intelligent assistance system for a COVID-19 crisis unit (SMART2C).
引用
收藏
页码:306 / 311
页数:6
相关论文
共 50 条
  • [41] Secure user authentication and key agreement scheme for IoT device access control based smart home communications
    Uppuluri, Sirisha
    Lakshmeeswari, G.
    WIRELESS NETWORKS, 2023, 29 (03) : 1333 - 1354
  • [42] Secure user authentication and key agreement scheme for IoT device access control based smart home communications
    Sirisha Uppuluri
    G. Lakshmeeswari
    Wireless Networks, 2023, 29 : 1333 - 1354
  • [43] An Attribute-Based Access Control for IoT Using Blockchain and Smart Contracts
    Zaidi, Syed Yawar Abbas
    Shah, Munam Ali
    Khattak, Hasan Ali
    Maple, Carsten
    Rauf, Hafiz Tayyab
    El-Sherbeeny, Ahmed M.
    El-Meligy, Mohammed A.
    SUSTAINABILITY, 2021, 13 (19)
  • [44] Query-based Access Control for Secure Collaborative Modeling using Bidirectional Transformations
    Bergmann, Gabor
    Debreceni, Csaba
    Rath, Istvan
    Varro, Daniel
    19TH ACM/IEEE INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS (MODELS'16), 2016, : 351 - 361
  • [45] Blockchain and Structural Relationship Based Access Control for IoT: A Smart City Use Case
    Sabrina, Fariza
    PROCEEDINGS OF THE IEEE LCN: 2019 44TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2019), 2019, : 137 - 140
  • [46] User authentication using Blockchain based smart contract in role-based access control
    Kamboj, Priyanka
    Khare, Shivang
    Pal, Sujata
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 2961 - 2976
  • [47] User authentication using Blockchain based smart contract in role-based access control
    Priyanka Kamboj
    Shivang Khare
    Sujata Pal
    Peer-to-Peer Networking and Applications, 2021, 14 : 2961 - 2976
  • [48] Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain
    Alshahrani, Mohammed
    Traore, Issa
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 156 - 175
  • [49] Secure Access Control for eHealth Data in Emergency Rescue Case based on Traceable Attribute-Based Encryption
    Shen, Yuan
    Song, Wei
    Zhao, Changsheng
    Peng, Zhiyong
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 201 - 208
  • [50] STUDY OF TINEA CAPITIS IN PHILADELPHIA USING CASE AND CONTROL GROUPS
    REID, BJ
    SHIMKIN, MB
    BLANK, F
    PUBLIC HEALTH REPORTS, 1968, 83 (06) : 497 - 502