User-managed access control for health care systems

作者: Amir H. Chinaei , Frank Wm. Tompa

DOI: 10.1007/11552338_5

关键词:

摘要: The requirements and technologies supporting shared health record databases pose new access control challenges. This paper proposes a decentralized system in which corporate policy can allow all owners to administer over their own objects, at the same time, objects are reasonably secure. We exploit various concepts of Rule Based Access Control, Role XML structures, object our model.

参考文章(22)
Ting Yu, Laks V.S. Lakshmanan, Divesh Srivastava, H.V. Jagadish, Compressed accessibility map: efficient access control for XML very large data bases. pp. 478- 489 ,(2002) , 10.1016/B978-155860869-6/50049-4
Wayne Jansen, Inheritance Properties of Role Hierarchies 21st National Information Systems Security Conference (NISSC '98); October 6-9, 1998; Crystal City, Virginia, United States. ,(1998)
J. A. Goguen, J. Meseguer, Security Policies and Security Models ieee symposium on security and privacy. pp. 11- 11 ,(1982) , 10.1109/SP.1982.10014
D. Elliott Bell, Leonard J. La Padula, Secure Computer System: Unified Exposition and Multics Interpretation Defense Technical Information Center. ,(1976) , 10.21236/ADA023588
D. Richard Kuhn, Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems Proceedings of the second ACM workshop on Role-based access control. pp. 23- 30 ,(1997) , 10.1145/266741.266749
Joon S. Park, Junseok Hwang, Role-based access control for collaborative enterprise in peer-to-peer computing environments Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03. pp. 93- 99 ,(2003) , 10.1145/775412.775424
R.S. Sandhu, Lattice-based access control models IEEE Computer. ,vol. 26, pp. 9- 19 ,(1993) , 10.1109/2.241422
Horst F. Wedde, Mario Lischka, Cooperative role-based administration Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03. pp. 21- 32 ,(2003) , 10.1145/775412.775416
A. K. Jones, R. J. Lipton, L. Snyder, A Linear time algorithm for deciding security foundations of computer science. pp. 33- 41 ,(1976) , 10.1109/SFCS.1976.1
Elisa Bertino, Sushil Jajodia, Pierangela Samarati, A flexible authorization mechanism for relational data management systems ACM Transactions on Information Systems. ,vol. 17, pp. 101- 140 ,(1999) , 10.1145/306686.306687