Security model for health care computing and communication systems

被引:0
|
作者
Abou El Kalam, A [1 ]
Deswarte, Y [1 ]
机构
[1] CNRS, LAAS, F-31077 Toulouse 4, France
关键词
security policy and models; RBAC; Context aware computing; deontic logic;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Health Care Computing and Communication Systems (HCCS) are characterized by the complexity of the organizations to take into account and the richness of properties that are required. To address this complexity and richness, we propose a security policy based on roles, groups of objects and context. Indeed, similarly to roles that structure the subjects, we introduce the new concept "group of objects,, which structures objects. Our major aim is to facilitate the security policy management, to cope with access right complexity, and to reduce administration errors. Then we develop a security model that covers the diversity of HCCS while achieving a good compromise between the respect of the least privilege principle and the flexibility of the access control. Following a logical approach, we design a formal system that extends the deontic logic, and we express the security policy in our language.
引用
收藏
页码:277 / 288
页数:12
相关论文
共 50 条
  • [1] Security aspects of ubiquitous computing in health care
    Weippl, E.
    Holzinger, A.
    Tjoa, A. M.
    [J]. ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2006, 123 (04): : 156 - 161
  • [2] Ensuring the security and privacy of information in mobile health-care communication systems
    Adesina, Ademola A.
    Agbele, Kehinde K.
    Februarie, Ronald
    Abidoye, Ademola P.
    Nyongesa, Henry O.
    [J]. SOUTH AFRICAN JOURNAL OF SCIENCE, 2011, 107 (9-10) : 26 - 32
  • [3] Communication security in open health care networks
    Blobel, B
    Pharow, P
    Engel, K
    Spiegel, V
    Krohn, R
    [J]. MEDICAL INFORMATICS EUROPE '99, 1999, 68 : 291 - 296
  • [4] Proposal for a Security Management in Cloud Computing for Health Care
    Haufe, Knut
    Dzombeta, Srdan
    Brandis, Knud
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [5] Communication and Security in Health Monitoring Systems - A Review
    Fotouhi, Hossein
    Causevic, Aida
    Lundqvist, Kristina
    Bjorkman, Mats
    [J]. PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 545 - 554
  • [6] Cloud computing security in health cyber physical systems
    Morolong, Mamoqenelo P.
    Shava, Fungai Bhunu
    Gamundani, Attlee M.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (05): : 1553 - 1568
  • [7] DATA COMMUNICATION SYSTEMS IN PRIMARY HEALTH-CARE - CONCEPTUAL MODEL
    LARSEN, LH
    [J]. MEDICAL JOURNAL OF AUSTRALIA, 1974, 1 (14) : 541 - 544
  • [8] Security communication model for vehicular clouds based on trusted computing
    Zhang, Wenbo
    Bao, Zhenshan
    Li, Jian
    Zhan, Jing
    [J]. Zhang, Wenbo (zhangwenbo@bjut.edu.cn), 1600, Huazhong University of Science and Technology (42): : 102 - 105
  • [9] Security model for picture archiving and communication systems
    Harding, DB
    Gac, RJ
    Reynolds, CT
    Romlein, J
    Chacko, AK
    [J]. JOURNAL OF DIGITAL IMAGING, 2000, 13 (02) : 202 - 203
  • [10] Security model for picture archiving and communication systems
    Douglas B. Harding
    Robert J. Gac
    Chester T. Reynolds
    John Romlein
    Anna K. Chacko
    [J]. Journal of Digital Imaging, 2000, 13 : 202 - 203