Alam et al., 2007 - Google Patents
Modeling and enforcing advanced access control policies in healthcare systems with SECTETAlam et al., 2007
View PDF- Document ID
- 1776732926768472315
- Author
- Alam M
- Hafner M
- Memon M
- Hung P
- Publication year
- Publication venue
- 1st International Workshop on Model-Based Trustworthy Health Informaton Systems, MOTHIS
External Links
Snippet
This contribution gives an overview of various access control strategies in use in contemporary healthcare scenarios and shows how a broad variety of respective policies can be covered by a single security policy model (UCON). Based on this policy model, the …
- 230000001131 transforming 0 abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/105—Human resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services; Handling legal documents
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Seol et al. | Privacy-preserving attribute-based access control model for XML-based electronic health record system | |
Hu et al. | Dynamic, context-aware access control for distributed healthcare applications | |
Zhang et al. | Security models and requirements for healthcare application clouds | |
Soceanu et al. | Managing the privacy and security of ehealth data | |
Alam et al. | xDAuth: a scalable and lightweight framework for cross domain access control and delegation | |
Khan et al. | Fine-grained access control to medical records in digital healthcare enterprises | |
Joshi et al. | Delegated authorization framework for ehr services using attribute-based encryption | |
Khan et al. | Context-aware access control for clinical information systems | |
Román-Martínez et al. | Blockchain-based service-oriented architecture for consent management, access control, and auditing | |
Hafner et al. | Modeling and enforcing advanced access control policies in healthcare systems with sectet | |
Blanquer et al. | Enhancing privacy and authorization control scalability in the grid through ontologies | |
Abd EL-Aziz et al. | Access control for healthcare data using extended XACML-SRBAC model | |
Alam et al. | Modeling and enforcing advanced access control policies in healthcare systems with SECTET | |
Khan et al. | Toward a synergy among discretionary, role-based and context-aware access control models in healthcare information technology | |
Sun et al. | Access control management for e-Healthcare in cloud environment | |
Dixit et al. | Semantically rich access control in cloud ehr systems based on ma-abe | |
Hsu et al. | The secure authorization model for healthcare information system | |
Warren et al. | Securing EHRs via CPMA attribute-based encryption on cloud systems | |
Memon et al. | SECTISSIMO: A Platform-Independent Framework for Security Services. | |
Pohlmann et al. | Rights management technologies: A good choice for securing electronic health records? | |
Runsewe | A policy-based management framework for cloud computing security | |
Khan et al. | Security in healthcare informatics: design and implementation of a robust authentication and a hybrid access control mechanism | |
Servos | A role and attribute based encryption approach to privacy and security in cloud based health services | |
Caumanns et al. | IHE IT-infrastructure white paper | |
Ben Yahya et al. | MA-MOrBAC: A distributed access control model based on mobile agent for multi-organizational, collaborative and heterogeneous systems |