A Personalized Access Control Framework for Workflow-Based Health Care Information

被引:0
作者
Leyla, Nazia [1 ]
MacCaull, Wendy [1 ]
机构
[1] St Francis Xavier Univ, Ctr Log & Informat, Antigonish, NS B2G 1C0, Canada
来源
BUSINESS PROCESS MANAGEMENT WORKSHOPS, PT II | 2012年 / 100卷
关键词
personalized access control; workflow; health care information system; EHR;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control is one of the key features of any health care organization. Without a strong access control mechanism, there is a risk of inappropriate use of personal health information. Here we focus on Personalized Access Control (PAC) [1] where the patient decides who can access his/her health record. We enhance the PAC model of [1] by proposing a prototypical framework, which incorporates a workflow into the PAC model to express the context of health care processes, and by providing a mechanism to capture a patient's consent to enforce the PAC policy. We enforce the "need to know" principle by associating roles with each task in a workflow and handle problems with delegation. We present a case study outlining the present working procedures of the Seniors' Wellness Program in our local health authority, using NOVA Workflow for workflow modeling and Ponder2 for representing and enforcing policy.
引用
收藏
页码:273 / 284
页数:12
相关论文
共 18 条
  • [1] [Anonymous], LECT NOTES COMPUTER
  • [2] Access control and audit model for the multidimensional modeling of data warehouses
    Fernandez-Medina, Eduardo
    Trujillo, Juan
    Villarroel, Rodolfo
    Piattini, Mario
    [J]. DECISION SUPPORT SYSTEMS, 2006, 42 (03) : 1270 - 1289
  • [3] Ferreira A., 2007, 9 INT C ENT INF SYST
  • [4] How to securely break into RBAC: the BTG-RBAC model
    Ferreira, Ana
    Chadwick, David
    Farinha, Pedro
    Correia, Ricardo
    Zao, Gansen
    Chilro, Rui
    Antunes, Luis
    [J]. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 23 - +
  • [5] Finin T., 2008, P 13 S ACC CONTR MOD
  • [6] Jacobsson A., 2008, THESIS BLEKINGE I TE
  • [7] Dynamic access control through Petri net workflows
    Knorr, K
    [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 159 - 167
  • [8] Leyla N., 2011, THESIS ST FRANCIS XA
  • [9] LYMBEROPOULOS L, 2004, P IFIP IEEE NETW OP, P31
  • [10] Rabbi F., THESIS ST FRANCIS XA