A Role and Activity Based Access Control for Secure Healthcare Systems

被引:8
|
作者
Pulur, Naim Alperen [1 ]
Altop, Duygu Karaoglan [1 ]
Levi, Albert [1 ]
机构
[1] Sabanci Univ, Istanbul, Turkey
来源
关键词
D O I
10.1007/978-3-319-22635-4_8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce a novel access control mechanism in order to safeguard privacy of medical data of patients in dynamic environments. Our access control model takes advantages from role-based access control (RBAC) and criticality aware access control (CAAC). In this way, our original approach allows the medical professionals with different roles to be granted access to medical records of patients automatically and without explicit request in case of a medical emergency. In this context, we design secure and privacy aware protocols from initial login to patients' medical data transmission and retrieval by the medical professionals. Moreover, we formally define access control policies for our system. Finally we show the feasibility of our approach by implementation and performance evaluation.
引用
收藏
页码:93 / 103
页数:11
相关论文
共 50 条
  • [41] A Smart Contract-Based Access Control Framework For Smart Healthcare Systems
    Abid, Amal
    Cheikhrouhou, Saoussen
    Kallel, Slim
    Tari, Zahir
    Jmaiel, Mohamed
    COMPUTER JOURNAL, 2024, 67 (02): : 407 - 422
  • [42] Mobile secure role based access control (MS-Ro-BAC) device
    House, TC
    PROCEEDINGS OF THE IEEE SOUTHEASTCON 2004: EXCELLENCE IN ENGINEERING, SCIENCE, AND TECHNOLOGY, 2005, : 542 - 546
  • [43] An object oriented role-based access control model for secure domain environments
    Department of Electrical and Computer Engineering, Ryerson University, Toronto, ON, M5B 2K3, Canada
    Int. J. Netw. Secur., 2007, 1 (10-16):
  • [44] Implement of Agent with Role-based Hierarchy Access Control for Secure Grouping IoTs
    Chen, Hsing-Chung
    Chang, Chia-Hui
    Leu, Fang-Yie
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 120 - 125
  • [45] A secure, constraint-aware role-based access control interoperation framework
    Baracaldo N.
    Masoumzadeh A.
    Joshi J.
    Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 200 - 207
  • [46] Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (12) : 1947 - 1960
  • [47] Policy storage for role-based access control systems
    Belokosztolszki, A
    Eyers, DM
    Wang, W
    Moody, K
    TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 196 - 201
  • [48] Resource and Role Hierarchy Based Access Control for Resourceful Systems
    Solanki, Nidhiben
    Huang, Yongtao
    Yen, I-Ling
    Bastani, Farokh
    Zhang, Yuqun
    2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 480 - 486
  • [49] Role-based access control model for CSCW systems
    Li, Chengkai
    Zhan, Yongzhao
    Mao, Bing
    Xie, Li
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (07): : 931 - 937
  • [50] On Formalizing and Normalizing Role-Based Access Control Systems
    Power, David
    Slaymaker, Mark
    Simpson, Andrew
    COMPUTER JOURNAL, 2009, 52 (03): : 305 - 325