A contextual role-based access control authorization model for electronic patient record

被引:51
作者
Motta, GHMB [1 ]
Furuie, SS
机构
[1] Univ Fed Paraiba, Dept Informat, BR-58059900 Joao Pessoa, Paraiba, Brazil
[2] Univ Sao Paulo, Sch Med, Inst Heart, Div Informat,InCor, BR-05403000 Sao Paulo, SP, Brazil
[3] Univ Sao Paulo, Polytech Sch, Biomed Engn Lab, BR-05508900 Sao Paulo, SP, Brazil
来源
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE | 2003年 / 7卷 / 03期
基金
巴西圣保罗研究基金会;
关键词
access control; authorization; contextual access control; electronic patient record (EPR); role-based access control (RBAC);
D O I
10.1109/TITB.2003.816562
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and,the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.
引用
收藏
页码:202 / 207
页数:6
相关论文
共 18 条
[1]   A flexible authorization mechanism for relational data management systems [J].
Bertino, E ;
Jajodia, S ;
Samarati, P .
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 1999, 17 (02) :101-140
[2]  
Beznosov K., 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), P310, DOI 10.1109/CSAC.1999.816041
[3]  
Department of Health and Human Services, 1998, FED REG 142, V63, P43241
[4]  
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
[5]   Security models for Web-based applications [J].
Joshi, JBD ;
Aref, WG ;
Ghafoor, A ;
Spafford, EH .
COMMUNICATIONS OF THE ACM, 2001, 44 (02) :38-44
[6]   Realisation of the computerised patient record; relevance and unsolved problems [J].
Kaihara, S .
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 1998, 49 (01) :1-8
[7]  
*MAG SOFTW ENT, 2000, MAG GUID APPL PART C
[8]  
Malamateniou F, 1998, IEEE Trans Inf Technol Biomed, V2, P139, DOI 10.1109/4233.735778
[9]  
*NAT AC SCI, 1997, REC PROT EL HLTH INF, P93
[10]  
OBELHEIRO RR, 2001, P 19 BRAZ S COMP NET