Adaptable access control policies for medical information systems

被引:0
|
作者
Verhanneman, T [1 ]
Jaco, L [1 ]
De Win, B [1 ]
Piessens, F [1 ]
Joosen, W [1 ]
机构
[1] Katholieke Univ Leuven, DistriNet, Dept Comp Sci, B-3001 Louvain, Belgium
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
IT enforced access control policies in medical information systems have to be fine-grained and dynamic. We justify this observation on the basis of legislation and on the basis of the evolution within the healthcare domain. Consequently, a reconfigurable or at least adaptable implementation of access control facilities has become extremely important. For this purpose, current technology provides insufficient support. We highlight a basic solution to address shortcomings by using interception techniques. In addition, we identify further research that is required to address the challenges of dynamic and fine-grained access control in the long run.
引用
收藏
页码:133 / 140
页数:8
相关论文
共 50 条
  • [31] Secure Access Control for Health Information Sharing Systems
    Alshehri, Suhair
    Raj, Rajendra K.
    2013 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI 2013), 2013, : 277 - 286
  • [32] Dynamic Authentication with Sensory Information for the Access Control Systems
    Shu, Yuanchao
    Gu, Yu
    Chen, Jiming
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) : 427 - 436
  • [33] Specification & Enforcement of Access Control in Information & Communication Systems
    El Kalam, Anas Abou
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2580 - 2585
  • [34] An Access Control Architecture for Protecting Health Information Systems
    Esposito, Angelo
    Sicuranza, Mario
    Ciampi, Mario
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 2017, 1 : 35 - 47
  • [35] Access Control for Weakly Consistent Replicated Information Systems
    Weber, Mathias
    Bieniusa, Annette
    Poetzsch-Heffter, Arnd
    SECURITY AND TRUST MANAGEMENT, STM 2016, 2016, 9871 : 82 - 97
  • [36] Extended model of Access Control for the Library Information Systems
    Normatov, Sherbek
    Rakhmatullaev, Marat
    2017 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMMUNICATIONS TECHNOLOGIES (ICISCT) - APPLICATIONS, TRENDS AND OPPORTUNITIES, 2017,
  • [37] A coordinator for workflow management systems with information access control
    Chou, SC
    Wu, CJ
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2005, E88D (12): : 2786 - 2792
  • [38] Modeling and enforcing advanced access control policies in healthcare systems with SECTET
    Hafner, Michael
    Memon, Mukhtiar
    Alam, Muhammad
    MODELS IN SOFTWARE ENGINEERING, 2008, 5002 : 132 - 144
  • [39] Visualizing Privacy Implications of Access Control Policies in Social Network Systems
    Anwar, Mohd
    Fong, Philip W. L.
    Yang, Xue-Dong
    Hamilton, Howard
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2010, 5939 : 106 - +
  • [40] Oblivious access control policies for cloud based data sharing systems
    Pervez, Zeeshan
    Khattak, Asad Masood
    Lee, Sungyoung
    Lee, Young-Koo
    Huh, Eui-Nam
    COMPUTING, 2012, 94 (12) : 915 - 938