[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Alam et al., 2007 - Google Patents

Modeling and enforcing advanced access control policies in healthcare systems with SECTET

Alam et al., 2007

View PDF
Document ID
1776732926768472315
Author
Alam M
Hafner M
Memon M
Hung P
Publication year
Publication venue
1st International Workshop on Model-Based Trustworthy Health Informaton Systems, MOTHIS

External Links

Snippet

This contribution gives an overview of various access control strategies in use in contemporary healthcare scenarios and shows how a broad variety of respective policies can be covered by a single security policy model (UCON). Based on this policy model, the …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/105Human resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents

Similar Documents

Publication Publication Date Title
Seol et al. Privacy-preserving attribute-based access control model for XML-based electronic health record system
Hu et al. Dynamic, context-aware access control for distributed healthcare applications
Zhang et al. Security models and requirements for healthcare application clouds
Soceanu et al. Managing the privacy and security of ehealth data
Alam et al. xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Khan et al. Fine-grained access control to medical records in digital healthcare enterprises
Joshi et al. Delegated authorization framework for ehr services using attribute-based encryption
Khan et al. Context-aware access control for clinical information systems
Román-Martínez et al. Blockchain-based service-oriented architecture for consent management, access control, and auditing
Hafner et al. Modeling and enforcing advanced access control policies in healthcare systems with sectet
Blanquer et al. Enhancing privacy and authorization control scalability in the grid through ontologies
Abd EL-Aziz et al. Access control for healthcare data using extended XACML-SRBAC model
Alam et al. Modeling and enforcing advanced access control policies in healthcare systems with SECTET
Khan et al. Toward a synergy among discretionary, role-based and context-aware access control models in healthcare information technology
Sun et al. Access control management for e-Healthcare in cloud environment
Dixit et al. Semantically rich access control in cloud ehr systems based on ma-abe
Hsu et al. The secure authorization model for healthcare information system
Warren et al. Securing EHRs via CPMA attribute-based encryption on cloud systems
Memon et al. SECTISSIMO: A Platform-Independent Framework for Security Services.
Pohlmann et al. Rights management technologies: A good choice for securing electronic health records?
Runsewe A policy-based management framework for cloud computing security
Khan et al. Security in healthcare informatics: design and implementation of a robust authentication and a hybrid access control mechanism
Servos A role and attribute based encryption approach to privacy and security in cloud based health services
Caumanns et al. IHE IT-infrastructure white paper
Ben Yahya et al. MA-MOrBAC: A distributed access control model based on mobile agent for multi-organizational, collaborative and heterogeneous systems