Trust negotiation for authentication and authorization in healthcare information systems

被引:12
|
作者
Vawdrey, DK [1 ]
Sundelin, TL [1 ]
Seamons, KE [1 ]
Knutson, CD [1 ]
机构
[1] Brigham Young Univ, Dept Comp Sci, Mobile Comp Lab, Provo, UT 84602 USA
关键词
security; authentication; access control; trust negotiation; surrogate trust negotiation;
D O I
10.1109/IEMBS.2003.1279579
中图分类号
R5 [内科学];
学科分类号
1002 ; 100201 ;
摘要
The expanding availability of health information in an electronic format is strategic for industry-wide efforts to improve the quality and reduce the cost of health care. The implementation of electronic medical record systems has been hindered by inadequate security provisions. This paper describes the use of trust negotiation as a framework for providing authentication and access control services in healthcare information systems. Trust negotiation enables two parties with no pre-existing relationship to establish the trust necessary to perform sensitive transactions via the mutual disclosure of attributes contained within digital credentials. An extension of this system, surrogate trust negotiation is introduced as a way to meet the security requirements of healthcare delivery systems based on mobile computing devices and wireless communication technologies. These innovative technologies have enormous potential to improve the current state of security in healthcare information systems.
引用
收藏
页码:1406 / 1409
页数:4
相关论文
共 50 条
  • [1] Mobile trust negotiation - Authentication and authorization in dynamic mobile networks
    van der Horst, TW
    Sundelin, T
    Seamons, KE
    Knutson, CD
    [J]. Communications and Multimedia Security, 2005, 175 : 97 - 109
  • [2] Distributed Authorization by Multiparty Trust Negotiation
    Zhang, Charles C.
    Winslett, Marianne
    [J]. COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 282 - 299
  • [3] Traust: A trust negotiation based authorization service
    Lee, Adam J.
    Winslett, Marianne
    Basney, Jim
    Welch, Von
    [J]. TRUST MANAGEMENT, PROCEEDINGS, 2006, 3986 : 458 - 462
  • [4] Trust negotiation systems
    Squicciarini, AC
    [J]. CURRENT TRENDS IN DATABASE TECHNOLOGY - EDBT 2004 WORKSHOPS, PROCEEDINGS, 2004, 3268 : 90 - 99
  • [5] DESIGNING A HEALTHCARE AUTHORIZATION MODEL BASED ON CLOUD AUTHENTICATION
    Chen, Chin-Ling
    Yang, Tsai-Tung
    Leu, Fang-Yie
    Huang, Yi-Li
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2014, 20 (03): : 365 - 379
  • [6] A Survey on Authorization in Distributed Systems: Information Storage, Data Retrieval and Trust Evaluation
    Ahadipour, Ava
    Schanzenbach, Martin
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 1016 - 1023
  • [7] An integrated authentication and authorization approach for the network of information architecture
    Aiash, Mahdi
    Loo, Jonathan
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 50 : 73 - 79
  • [8] The Secure Authorization Model for Healthcare Information System
    Wen-Shin Hsu
    Jiann-I Pan
    [J]. Journal of Medical Systems, 2013, 37
  • [9] The Secure Authorization Model for Healthcare Information System
    Hsu, Wen-Shin
    Pan, Jiann-I
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)
  • [10] Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems
    Hind Idrissi
    Paolo Palmieri
    [J]. The Journal of Supercomputing, 2024, 80 : 6622 - 6660