Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/CBMS.2008.14guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Behavior-Based Access Control for Distributed Healthcare Environment

Published: 17 June 2008 Publication History

Abstract

Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional healthcare workflows for sharing patient profiles has made the entire system vulnerable to security and privacy breaches. In this paper we present a novel access control model based on a framework designed for data and service interoperability in the healthcare domain. The proposed model for customizable access control captures the dynamic behavior of the user and determines access rights accordingly. The model is generic and flexible in the sense that an access control engine dynamically receives security effective factors from the subject user, and identifies the privilege level in accessing clinical data using different specialized components within the engine. Standard data representation formats are used to make the model compatible with different healthcare environments. The access control engine uses a flow-based approach to follow the user's behavior. The proposed model is supported by a real world case study.

Cited By

View all
  • (2013)Behavior-based access control for distributed healthcare systemsJournal of Computer Security10.5555/2595846.259584721:1(1-39)Online publication date: 1-Jan-2013
  • (2013)An infrastructure for secure sharing of medical images between PACS and EHR systemsProceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research10.5555/2555523.2555549(245-259)Online publication date: 18-Nov-2013
  • (2013)Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcareInternational Journal of Security and Networks10.1504/IJSN.2013.0559438:2(94-105)Online publication date: 1-Aug-2013
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
CBMS '08: Proceedings of the 2008 21st IEEE International Symposium on Computer-Based Medical Systems
June 2008
659 pages
ISBN:9780769531656

Publisher

IEEE Computer Society

United States

Publication History

Published: 17 June 2008

Author Tags

  1. Behavior
  2. Context Aware Access Control
  3. HL7
  4. Patient Data
  5. Security

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2013)Behavior-based access control for distributed healthcare systemsJournal of Computer Security10.5555/2595846.259584721:1(1-39)Online publication date: 1-Jan-2013
  • (2013)An infrastructure for secure sharing of medical images between PACS and EHR systemsProceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research10.5555/2555523.2555549(245-259)Online publication date: 18-Nov-2013
  • (2013)Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcareInternational Journal of Security and Networks10.1504/IJSN.2013.0559438:2(94-105)Online publication date: 1-Aug-2013
  • (2010)Cryptography based access control in healthcare web systems2010 Information Security Curriculum Development Conference10.1145/1940941.1940960(66-79)Online publication date: 1-Oct-2010
  • (2010)BABACProceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing10.1109/GreenCom-CPSCom.2010.60(747-754)Online publication date: 18-Dec-2010

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media