Literature DB >> 27722980

Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.

Faouzi Jaïdi1, Faten Labbene-Ayachi2, Adel Bouhoula2.   

Abstract

Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.

Keywords:  Access control; Compliance-monitoring; Databases-security; E-healthcare-privacy; E-healthcare-security

Mesh:

Year:  2016        PMID: 27722980     DOI: 10.1007/s10916-016-0630-2

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  2 in total

1.  Healthcare information system architecture (HISA) and its middleware models.

Authors:  J R Scherrer; S Spahni
Journal:  Proc AMIA Symp       Date:  1999

Review 2.  Privacy, confidentiality, and electronic medical records.

Authors:  R C Barrows; P D Clayton
Journal:  J Am Med Inform Assoc       Date:  1996 Mar-Apr       Impact factor: 4.497

  2 in total
  1 in total

1.  Assessing staff awareness and effectiveness of educational training on IT security and privacy in a large healthcare organization.

Authors:  Mubashir Aslam Arain; Rima Tarraf; Armghan Ahmad
Journal:  J Multidiscip Healthc       Date:  2019-01-09
  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.