An attributable role-based access control for healthcare

被引:0
|
作者
Schwartmann, D [1 ]
机构
[1] German Aerosp Ctr, DLR, Cologne, Germany
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Role Based Access Control (RBAC) has the potential for reducing the complexity and total cost of security administration. Even though RBAC implementations aim on administrating large scale systems, they have a shortcoming in common. They do not allow to define attributable roles and permissions. But such roles are very common in our thoughts and language. When we say "attending physician of patient x", we mean a role attending physician with all associated permissions to fulfill the treatment of patient x. Because the resulting permissions only differ in the restriction to a particular patient, it is desirable that attributes like "patient x" are used in roles and permissions to restrict the rights to access only data related to that patient. This paper shows how attributes can be applied to RBAC, in order to reduce the total number of role- and permission-objects in security administration.
引用
收藏
页码:1148 / 1155
页数:8
相关论文
共 50 条
  • [41] Integrating Attributes into Role-Based Access Control
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    Krishnan, Ram
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 242 - 249
  • [42] Mining constraints in role-based access control
    Ma, Xiaopu
    Li, Ruixuan
    Lu, Zhengding
    Wang, Wei
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 87 - 96
  • [43] A novel approach to role-based access control
    Chae, SH
    Kim, W
    Kim, DK
    [J]. COMPUTATIONAL SCIENCE - ICCS 2003, PT IV, PROCEEDINGS, 2003, 2660 : 1060 - 1068
  • [44] The implementation of role-based access control on the web
    Xu, CG
    Yan, H
    Liu, FG
    [J]. 2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : D251 - D255
  • [45] Garbled role-based access control in the cloud
    Alam, Masoom
    Emmanuel, Naina
    Khan, Tanveer
    Xiang, Yang
    Hassan, Houcine
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1153 - 1166
  • [46] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [47] Spatial context in role-based access control
    Zhang, Hong
    He, Yeping
    Shi, Zhiguo
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2006, PROCEEDINGS, 2006, 4296 : 166 - 178
  • [48] Role-based access control for a distributed calculus
    Braghin, Chiara
    Gorla, Daniele
    Sassone, Vladimiro
    [J]. JOURNAL OF COMPUTER SECURITY, 2006, 14 (02) : 113 - 155
  • [49] A novel approach for role-based access control
    Yang Geng
    Rong Chunming
    Shen Jiangang
    Wang Jiangtao
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (01) : 1 - 6
  • [50] Context sensitivity in role-based access control
    Kumar, Arun
    Karnik, Neeran
    Chafle, Girish
    [J]. Operating Systems Review (ACM), 2002, 36 (03): : 53 - 66