2013
DOI: 10.3233/jcs-2012-0454
|View full text |Cite
|
Sign up to set email alerts
|

Behavior-based access control for distributed healthcare systems

Abstract: Sensitivity of clinical data and strict rules regarding data sharing have caused privacy and security to be critical requirements for using patient profiles in distributed healthcare systems. The amalgamation of new information technology with traditional healthcare workflows for sharing patient profiles has made the whole system vulnerable to privacy and security breaches. Standardization organizations are developing specifications to satisfy the required privacy and security requirements. In this paper we pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2013
2013
2018
2018

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(3 citation statements)
references
References 36 publications
0
2
0
1
Order By: Relevance
“…A service access based on the user behavior (Yarmand, Sartipi & Down, 2013) provided the concept of analyzing the user characteristics while designing an adaptive security policy. Our earlier work (Jagadamba and Sathish Babu, 2016a;Jagadamba & Sathish Babu, 2013) was able to examine the user request through the contextual information before fulfilling the request.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A service access based on the user behavior (Yarmand, Sartipi & Down, 2013) provided the concept of analyzing the user characteristics while designing an adaptive security policy. Our earlier work (Jagadamba and Sathish Babu, 2016a;Jagadamba & Sathish Babu, 2013) was able to examine the user request through the contextual information before fulfilling the request.…”
Section: Literature Reviewmentioning
confidence: 99%
“…There are role-based, team-based, attribute-based, content-based, scenario-based, situation-aware, context-aware, and context sensitive access control methods (see [14] and [4] for an overview). However, only some of these approaches have been implemented for healthcare scenarios [4]- [15], a few of them consider the problem in distributed and dynamic scenarios [7] whereas a small number of approaches propose models adherent to healthcare standards [14], [2], [5], [8]. In all these systems the notion of e-consent is integrated with the policy decision mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…Una vez los datos han pasado por el sistema de consolidación, quedan habilitados para ser analizados por el componente de análisis. Dado que los datos consolidados en el sistema corresponden a información de un paciente y que por tanto se debe garantizar su seguridad, el acceso a sistema se ha segregado en roles que manejan distintos niveles de seguridad [42]. Los roles definidos son: Médico, cuidador, familiar, alta temprana, administrador funcional y administrador técnico (Figura 3).…”
Section: ) Solucionar El Manejo De La Seguridad De Los Datosunclassified