A Personalized Access Control Framework for Workflow-Based Health Care Information

نویسندگان

  • Nazia Leyla
  • Wendy MacCaull
چکیده

Access control is one of the key features of any healthcare system. This problem is becoming increasingly complex as health care is distributed over many care settings. Most security models for clinical information systems are merely variations of Role-Based Access Control (RBAC) which bases access decisions on the role of the user rather than with patient consent. As a patient is the owner of his/her medical information, there is a move to letting the patient decide who has access to their information. In this talk, we outline how personalized access control can be enforced in a healthcare system so that the patient can control the revelation of their medical data. Data can be accessed by a caregiver only when the personal policy permits access to that caregiver. Depending on specific information associated with a task in a workflow, i.e., the context, in which the access is being executed, different personal policies can be applied. Personal policy also includes rules for updating the access information. In the implementation of our system, it is planned that policies will be defined by the policy language ponder2. The workflows will be modeled in YAWL and stored as an XML file. The roles of users will be associated with the workflows. The Policy interpreter will process the current access request with respect to the workflow context, hospital policy and patient policy and then produce the access decision. A mechanism to handle delegation will be included.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A centralized privacy-preserving framework for online social networks

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

متن کامل

Role - Based Access Control ( Rbac ) Based In Hospital Management

A key issue in any information security is to protect information about all forms against unauthorized access. Innovation access control model is now becoming a need for application on systems due to emerging acts. Role based access control (RBAC) is a feasible alternative to traditional Discretionary Access Control (DAC) and Mandatory Access Control (MAC). RBAC has been presented to be cost op...

متن کامل

Static Information Flow Analysis of Workflow Models

This paper proposes a framework for the detection of information leaks in workflow descriptions based on static information flow analysis. Despite the correct deployment of access control mechanisms, certain information leaks can persist, thereby undermining the compliance of workflows to policies. The framework put forward in this paper identifies leaks induced by the structure of the workflow...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Development of a System Framework for Implementation of an Enhanced Role-Based Access Control Model to Support Collaborative Processes

We previously developed an enhanced Role-Based Access Control (RBAC) model to support information access management in the context of team collaboration and workflow. We report in this paper a generic system framework to implement the enhanced RBAC with three functional layers: (1) encoding of access control policies; (2) interpretation of the encoded policies; and (3) application of policies t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011