Behavioral and Human-Centric Access Control Model in XACML Reference Architecture: Design and Implementation of EHR Case Study

被引:0
作者
Farhadighalati, Nastaran [1 ,2 ]
Barata, Jose [1 ,2 ]
Nikghadam-Hojjati, Sanaz [1 ,2 ]
Marchetti, Eda [3 ]
机构
[1] NOVA Univ Lisbon, NOVA Sch Sci & Technol, UNINOVA CTS, P-2829516 Lisbon, Portugal
[2] NOVA Univ Lisbon, LASI, P-2829516 Lisbon, Portugal
[3] CNR, Inst Informat Sci & Technol, ISTI, Pisa, Italy
来源
TECHNOLOGICAL INNOVATION FOR HUMAN-CENTRIC SYSTEMS, DOCEIS 2024 | 2024年 / 716卷
关键词
Health; 5.0; Human-centric; Security; Access control; User behavior; Internet of Behavior; XACML;
D O I
10.1007/978-3-031-63851-0_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy and security are crucial for using Electronic Patient Records (EHRs) within healthcare systems, as clinical data is sensitive. In response to this, several access control approaches have been recently developed to limit access to sensitive information. This paper presents a novel human-centric access control model, Behavioral-Based Access Control (BBAC), inspired by the Internet of Behavior paradigm. The proposed model implements behavioral modeling, allowing privacy-preserving data sharing based on user behaviors in complex healthcare environments. The model enhances security and privacy in distributed healthcare systems by adjusting access permissions according to user behavior, location, and time, as evaluated in a simulated scenario. The proposed model uses the XACML policy language to implement BBAC, which determines whether to allow or deny user access requests. This approach enables personalized and secure access control by analyzing user behavioral patterns and adjusting permissions accordingly. The ability to regulate access based on individual user behavior represents a shift towards more adaptive and tailored security mechanisms and discusses its dynamic potential for future research.
引用
收藏
页码:192 / 203
页数:12
相关论文
共 24 条
[1]  
Benantar M., 2005, Access control systems: security, identity management and trust models, DOI [10.1007/0-387-27716-1, DOI 10.1007/0-387-27716-1]
[2]  
Chen H., 2020, Comput. Mater. Continua, V65
[3]   Efficient and Secure Cross-Domain Sharing of Blockchain Electronic Medical Records Based on Edge Computing [J].
Cheng, Yage ;
Gong, Bei ;
Jia, ZhiJuan ;
Yang, YanYan ;
He, Yuchu ;
Zhang, Xiaofei .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[4]   A systematic review of patient access to medical records in the acute setting: practicalities, perspectives and ethical consequences [J].
D'Costa, Stephanie N. ;
Kuhn, Isla L. ;
Fritz, Zoe .
BMC MEDICAL ETHICS, 2020, 21 (01)
[5]  
Debellis M., 2021, A Practical Guide to Building OWL Ontologies Using Protege 5.5 and Plugins
[6]  
Ferrer Nicolas G., 2021, Implementation of XACML tools
[7]  
Hathaliya J, 2019, INT CONF ADV COMPU, P87, DOI [10.1109/IACC48062.2019.8971593, 10.1109/iacc48062.2019.8971593]
[8]   Generalized Mining of Relationship-Based Access Control Policies in Evolving Systems [J].
Iyer, Padmavathi ;
Masoumzadeh, Amirreza .
PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT '19), 2019, :135-140
[9]  
Javaid M., 2021, Sensors International, V2, P100122, DOI DOI 10.1016/J.SINTL.2021.100122
[10]   Access control and privilege management in electronic health record: a systematic literature review [J].
Jayabalan, Manoj ;
O'Daniel, Thomas .
JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (12)