Security Policy Integration based on Role-Based Access Control Model in Healthcare Collaborative Environments

被引:0
|
作者
Kuang, Teo Poh [1 ]
Ibrahim, Hamidah [1 ]
机构
[1] Univ Putra Malaysia, Fac Comp Sci & Informat Technol, Upm Serdang 43400, Selangor, Malaysia
关键词
Security Policy Integration; Role-Based Access Control; Collaborative Environment; Redundancy; Conflict;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently research is focused on security policy integration and conflict reconciliation among various healthcare organizations. However, challenging security and privacy risks issues still arisen during sharing sensitive patient data in different large distributed organizations. In this paper, we proposed an approach for integrating security policies based on Role-Based Access Control (RBAC) policy model that supports dynamic constraint rules and meta data information, reduces policy redundancy and resolves conflicts based on the types of policy redundancy and conflict. We believe this work can support dynamic updates and control policies in collaborative environments.
引用
收藏
页码:553 / 559
页数:7
相关论文
共 50 条
  • [31] An application using role-based access control model
    Wang, G
    Cong, B
    Chen, N
    Lan, M
    Yan, HT
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 369 - 375
  • [32] Role-based Access Control Model for Multicast in MANET
    Mu Haibing
    Zhang Changlun
    Zeng Ping
    [J]. ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 816 - 819
  • [33] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [34] dRBAC: Distributed role-based access control for dynamic coalition environments
    Freudenthal, E
    Pesin, T
    Port, L
    Keenan, E
    Karamcheti, V
    [J]. 22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 411 - 420
  • [35] A General Attribute and Rule Based Role-Based Access Control Model
    朱一群
    李建华
    张全海
    [J]. Journal of Shanghai Jiaotong University., 2007, (06) - 724
  • [36] A General Attribute and Rule Based Role-Based Access Control Model
    朱一群
    李建华
    张全海
    [J]. Journal of Shanghai Jiaotong University(Science), 2007, (06) : 719 - 724
  • [37] Role-based Access Control for Memory Security on Network-on-Chips
    Chen, Song-Tao
    Xu, Lin-Fu
    Hang, Yan-Xi
    Li, Lun-wei
    [J]. 2016 13TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2016, : 1422 - 1424
  • [38] Security Analysis of Role-Based Access Control through Program Verification
    Ferrara, Anna Lisa
    Madhusudan, P.
    Parlato, Gennaro
    [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 113 - 125
  • [39] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    [J]. COMPUTER, 2012, 45 (06) : 81 - 88
  • [40] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184