Security Policy Integration based on Role-Based Access Control Model in Healthcare Collaborative Environments

被引:0
|
作者
Kuang, Teo Poh [1 ]
Ibrahim, Hamidah [1 ]
机构
[1] Univ Putra Malaysia, Fac Comp Sci & Informat Technol, Upm Serdang 43400, Selangor, Malaysia
关键词
Security Policy Integration; Role-Based Access Control; Collaborative Environment; Redundancy; Conflict;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently research is focused on security policy integration and conflict reconciliation among various healthcare organizations. However, challenging security and privacy risks issues still arisen during sharing sensitive patient data in different large distributed organizations. In this paper, we proposed an approach for integrating security policies based on Role-Based Access Control (RBAC) policy model that supports dynamic constraint rules and meta data information, reduces policy redundancy and resolves conflicts based on the types of policy redundancy and conflict. We believe this work can support dynamic updates and control policies in collaborative environments.
引用
收藏
页码:553 / 559
页数:7
相关论文
共 50 条
  • [1] A role-based multilevel security access control model
    Pan, L
    Zhang, CN
    Yang, CG
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2006, 46 (03) : 1 - 10
  • [2] Role-based Access Control Model in Home Network Environments
    Kim, Do-Woo
    Kim, Geon Woo
    Lee, Jun-Ho
    Han, Jong-Wook
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 8, 2005, 8 : 97 - 99
  • [3] A Novel Role-based Access Control Model in Cloud Environments
    Jun Luo
    Hongjun Wang
    Xun Gong
    Tianrui Li
    [J]. International Journal of Computational Intelligence Systems, 2016, 9 : 1 - 9
  • [4] A Novel Role-based Access Control Model in Cloud Environments
    Luo, Jun
    Wang, Hongjun
    Gong, Xun
    Li, Tianrui
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2016, 9 (01) : 1 - 9
  • [5] An attributable role-based access control for healthcare
    Schwartmann, D
    [J]. COMPUTATIONAL SCIENCE - ICCS 2004, PROCEEDINGS, 2004, 3039 : 1148 - 1155
  • [6] The application of security policy to role-based access control and the common data security architecture
    Lin, A
    Brown, R
    [J]. COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1584 - 1593
  • [7] Enhanced Role-Based Access Control for Cloud Security
    Balamurugan, B.
    Krishna, P. Venkata
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 837 - 852
  • [8] Role-based web security access control system
    Gui, Yan-Feng
    Lin, Zuo-Quan
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2003, 40 (08):
  • [9] A spatio-temporal role-based access control model for wireless LAN security policy management
    Bera, P.
    Ghosh, S.K.
    Dasgupta, Pallab
    [J]. Communications in Computer and Information Science, 2010, 54 : 76 - 88
  • [10] A Spatio-Temporal Role-Based Access Control Model for Wireless LAN Security Policy Management
    Bera, P.
    Ghosh, S. K.
    Dasgupta, Pallab
    [J]. INFORMATION SYSTEMS, TECHNOLOGY AND MANAGEMENT, PROCEEDINGS, 2010, 54 : 76 - +