2020
DOI: 10.4108/eai.13-7-2018.163213
|View full text |Cite
|
Sign up to set email alerts
|

Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems

Abstract: INTRODUCTION:In medical cyber-physical systems (mCPS), availability must be prioritized over other security properties, making it challenging to craft least-privilege authorization policies which preserve patient safety and confidentiality even during emergency situations. For example, unauthorized access to device(s) connected to a patient or an app controlling these devices could result in patient harm. Previous work has suggested a virtual version of "Break the Glass" (BTG), an analogy to breaking a physica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…Padhya and Jinwala [20] propose a mechanism which can handle emergency situations where no authorized user exists to perform or to delegate a time-critical task. Tasali and Vasserman [21] present how to handle Break-the-Glass natively within the ABAC model, maintaining full compatibility with existing access control frameworks, putting Break-the-Glass in the policy domain rather than requiring framework modifications. Rajput et al [22] propose an emergency access control management system (EACMS) based on permissioned blockchain.…”
Section: Emergency Access Controlmentioning
confidence: 99%
“…Padhya and Jinwala [20] propose a mechanism which can handle emergency situations where no authorized user exists to perform or to delegate a time-critical task. Tasali and Vasserman [21] present how to handle Break-the-Glass natively within the ABAC model, maintaining full compatibility with existing access control frameworks, putting Break-the-Glass in the policy domain rather than requiring framework modifications. Rajput et al [22] propose an emergency access control management system (EACMS) based on permissioned blockchain.…”
Section: Emergency Access Controlmentioning
confidence: 99%