IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI) 2014
DOI: 10.1109/bhi.2014.6864421
|View full text |Cite
|
Sign up to set email alerts
|

Standardized access control mechanisms for protecting ISO 13606-based electronic health record systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…Medical records in the EHR are sensitive data and require security mechanisms to protect their privacy from attackers. In addition, the different levels and privileges of healthcare providers make the development of security mechanisms and authorisation models very difficult [4]. Moreover, applying privacy to medical records (EHR) requires the use of access models in the authorisation of users.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Medical records in the EHR are sensitive data and require security mechanisms to protect their privacy from attackers. In addition, the different levels and privileges of healthcare providers make the development of security mechanisms and authorisation models very difficult [4]. Moreover, applying privacy to medical records (EHR) requires the use of access models in the authorisation of users.…”
Section: Discussionmentioning
confidence: 99%
“…This standard has many of the features that qualify it for use on the Internet, such as combining policy, combining algorithm, attribute, multiple subjects, policy distribution, implementation independency and obligations [23,28,29]. This technique is based on the specific policies first and then on many modules such as policy enforcement point (PEP), policy decision point (PDP), policy administration point (PAP), policy information point (PIP), and policy retrieval point (PRP) to evaluate the request for access [4], as shown in Figure 3 (PEP sends and receives requests and accesses responses to the repository; PDP evaluates the decision; PAP creates policies based on users’ attributes; PIP retrieves users’ attributes; and PRP retrieves the users’ data from the repository). The result of the decision (permit, deny, not applicable, indeterminate) is sent to the subject via PEP [23].…”
Section: Overview Of Security and Privacy Techniques In Ehr Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…In the meantime, very little effort is spent describing how to log in to a remote server to retrieve the policy model in the first place. Nevertheless, work has been done to realise an access control model based on the standard [34].…”
Section: Loginmentioning
confidence: 99%