Towards Risk-aware Access Control Framework for Healthcare Information Sharing

被引:6
|
作者
Abomhara, Mohamed [1 ]
Koien, Geir M. [1 ]
Oleshchuk, Vladimir A. [1 ]
Hamid, Mohamed [1 ]
机构
[1] Univ Agder, Dept Informat & Commun Technol, Grimstad, Norway
关键词
Access Control; Healthcare Information Sharing; Electronic Health Records; Security; Privacy; Risk Assessment; Risk Management;
D O I
10.5220/0006608103120321
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control models play an important role in the response to insider threats such as misuse and unauthorized disclosure of the electronic health records (EHRs). In our previous work in the area of access control, we proposed a work-based access control (WBAC) model that strikes a balance between collaboration and safeguarding sensitive patient information. In this study, we propose a framework for risk assessment that extend the WBAC model by incorporating a risk assessment process, and the trust the system has on its users. Our framework determines the risk associated with access requests (user's trust level and requested object's security level) and weighting such risk against the risk appetite and risk threshold of situational conditions. Specifically, an access request will be permitted if the risk threshold outweighs the risk of granting access to information, otherwise it will be denied.
引用
收藏
页码:312 / 321
页数:10
相关论文
共 50 条
  • [1] A Framework for Risk-Aware Role Based Access Control
    Bijon, Khalid Zaman
    Krishnan, Ram
    Sandhu, Ravi
    [J]. 2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 462 - 469
  • [2] XACML and Risk-Aware Access Control
    Chen, Liang
    Gasparini, Luca
    Norman, Timothy J.
    [J]. WOSIS: PROCEEDINGS OF THE 10TH INTERNATIONAL WORKSHOP ON SECURITY IN INFORMATION SYSTEMS, 2013, : 66 - 75
  • [3] A Risk-Aware Access Control Framework for Cyber-Physical Systems
    Akhuseyinoglu, Nuray Baltaci
    Joshi, James
    [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 349 - 358
  • [4] A topology and risk-aware access control framework for cyber-physical space
    Yan Cao
    Zhiqiu Huang
    Yaoshen Yu
    Changbo Ke
    Zihao Wang
    [J]. Frontiers of Computer Science, 2020, 14
  • [5] A topology and risk-aware access control framework for cyber-physical space
    Cao, Yan
    Huang, Zhiqiu
    Yu, Yaoshen
    Ke, Changbo
    Wang, Zihao
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2020, 14 (04)
  • [6] TIRIAC: A trust-driven risk-aware access control framework for Grid environments
    Nogoorani, Sadegh Dorri
    Jalili, Rasool
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 238 - 254
  • [7] Anomalies Correlation for Risk-Aware Access Control Enhancement
    Evina, Pierrette Annie
    Ayachi, Faten Labbene
    Jaidi, Faouzi
    Bouhoula, Adel
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2018, : 299 - 304
  • [8] Risk-Aware Control
    Sanger, Terence D.
    [J]. NEURAL COMPUTATION, 2014, 26 (12) : 2669 - 2691
  • [9] Risk-Aware Information Disclosure
    Armando, Alessandro
    Bezzi, Michele
    Metoui, Nadia
    Sabetta, Antonino
    [J]. DATA PRIVACY MANAGEMENT, AUTONOMOUS SPONTANEOUS SECURITY, AND SECURITY ASSURANCE, 2015, 8872 : 266 - 276
  • [10] MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android
    Chen, Jiayi
    Hengartner, Urs
    Khan, Hassan
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2024, 27 (02)