Application of Privacy-aware Role-based Access Control Model in IHE-XDS

被引:1
|
作者
Dauletbek, Daniya [1 ]
Yuan, Shi-Zhong [1 ]
机构
[1] Shanghai Univ, Sch Comp Engn & Sci, Shanghai, Peoples R China
关键词
D O I
10.1051/itmconf/20171203038
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Integrating the Healthcare Enterprise ((IHE)'s Cross-Enterprise Document Sharing (XDS) profile is an open standards-based architecture specification for EHR systems. In EHR systems, it is necessary to provide a mechanism for access control to protect security and privacy of patient data. On the basis of related studies, this paper addresses the issue of access control and privacy protection of privacy data in XDS-based EHR systems, aiming to identify a suitable, privacy-aware role-based access control model based on specific access requirements for IHE-XDS. Privacy aware role-based access control model is an extension model of RBAC model. It not just has the benefits of RBAC, but additionally adds restrictions on the permission assignment for the roles by using the purpose enforcement and privacy-aware access control enforcement. The proposed model could further protect privacy data, while decreasing the complexity of the role assignment.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Distributed Role-based Access Control for Coaliagion Application
    HONG Fan ZHU Xian XING GuanglinHONG Fan
    [J]. Geo-spatial Information Science, 2005, (02) : 138 - 143
  • [42] Research and Application of an Extended Role-Based Access Control
    Zhao, Jingsheng
    Zhang, Wei
    Zhang, Peng
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2654 - 2656
  • [43] Distributed Role-based Access Control for Coaliagion Application
    Hong Fan
    Zhu Xian
    Xing Guanglin
    [J]. GEO-SPATIAL INFORMATION SCIENCE, 2005, 8 (02) : 138 - 143
  • [44] Application of an Improved Role-Based Access Control Model in OBS Security Mechanism
    Jiang, Xueying
    Zhang, Chengjun
    Liu, Kean
    Li, Shiyao
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL II, 2010, : 555 - 558
  • [45] The application research of role-based access control model in workflow management system
    Wang, BY
    Zhang, SM
    Xia, XD
    [J]. GRID AND COOPERATIVE COMPUTING, PT 2, 2004, 3033 : 1034 - 1037
  • [46] Embedding role-based access control model in object-oriented systems to protect privacy
    Chou, SC
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 71 (1-2) : 143 - 161
  • [47] A role-based access control model for information mediation
    Yang, L
    Ege, RK
    Ezenwoye, O
    Kharma, Q
    [J]. PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
  • [48] Privacy-aware access control through negotiation in daily life service
    Park, Hyun-A
    Zhan, Justin
    Lee, Dong Hoon
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 : 514 - +
  • [49] A formal model for parameterized role-based access control
    Abdallah, AE
    Khayat, EJ
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 233 - 246
  • [50] A formal model for role-based access control with constraints
    Giuri, L
    Iglio, P
    [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145