An attributable role-based access control for healthcare

被引:0
|
作者
Schwartmann, D [1 ]
机构
[1] German Aerosp Ctr, DLR, Cologne, Germany
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Role Based Access Control (RBAC) has the potential for reducing the complexity and total cost of security administration. Even though RBAC implementations aim on administrating large scale systems, they have a shortcoming in common. They do not allow to define attributable roles and permissions. But such roles are very common in our thoughts and language. When we say "attending physician of patient x", we mean a role attending physician with all associated permissions to fulfill the treatment of patient x. Because the resulting permissions only differ in the restriction to a particular patient, it is desirable that attributes like "patient x" are used in roles and permissions to restrict the rights to access only data related to that patient. This paper shows how attributes can be applied to RBAC, in order to reduce the total number of role- and permission-objects in security administration.
引用
收藏
页码:1148 / 1155
页数:8
相关论文
共 50 条
  • [1] A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain
    Omran, Esraa
    Grandison, Tyrone
    Nelson, David
    Bokma, Albert
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2013, 7 (03) : 36 - 52
  • [2] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [3] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [4] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    [J]. COMPUTER, 2012, 45 (06) : 81 - 88
  • [5] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    [J]. International Journal of Information Security, 2008, 7 : 123 - 136
  • [6] Practical Role-Based Access Control
    Galante, Victoria
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [7] Generalized Role-Based Access Control
    Moyer, MJ
    Ahamad, M
    [J]. 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398
  • [8] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136
  • [9] Fuzzy Role-Based Access Control
    Martinez-Garcia, Carles
    Navarro-Arribas, Guillermo
    Borrell, Joan
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
  • [10] Migrating to role-based access control
    Brooks, K
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81