Secure Access Control for Health Information Sharing Systems

被引:19
作者
Alshehri, Suhair [1 ]
Raj, Rajendra K. [1 ]
机构
[1] Rochester Inst Technol, B Thomas Golisano Coll Comp & Informat Sci, Rochester, NY 14623 USA
来源
2013 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI 2013) | 2013年
关键词
D O I
10.1109/ICHI.2013.40
中图分类号
R-058 [];
学科分类号
摘要
The Health Information Technology for Economic and Clinical Health Act (HITECH) of 2009 encourages healthcare providers to share information to improve healthcare quality at reduced cost. Such information sharing, however, raises security and privacy concerns that require appropriate access control mechanisms to ensure Health Insurance Portability and Accountability Act (HIPAA) compliance. Current approaches such as Role-Based Access Control (RBAC) and its variants, and newer approaches such as Attribute-Based Access Control (ABAC) are inadequate. RBAC provides simple administration of access control and user permission review, but demands complex initial role engineering and makes access control inflexible. ABAC, on the other hand, simplifies initial setup but increases the complexity of managing privileges and user permissions. These limitations have motivated research into the development of newer access control models that use attributes and policies while preserving RBAC's strengths. The BiLayer Access Control (BLAC) model is a two-step method being proposed to integrate attributes with roles: an access request is checked against pseudoroles, i.e., the list of subject attributes (first layer), and then against rules within the policies (second layer) associated with the requested object. This paper motivates the BLAC approach, outlines the BLAC model, and illustrates its usefulness to healthcare information sharing environments.
引用
收藏
页码:277 / 286
页数:10
相关论文
共 34 条
[1]   A model for attribute-based user-role assignment [J].
Al-Kahtani, MA ;
Sandhu, R .
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, :353-362
[2]  
Alipour H. S., 2011, 2011 6th International Conference for Internet Technology and Secured Transactions (ICITST), P472
[3]  
[Anonymous], DARK READING MAY
[4]  
[Anonymous], 1992, 15 NAT COMP SEC C
[5]  
[Anonymous], 2011, C NEWS DEC
[6]  
Bertino E., 2000, Proceedings of the fifth ACM workshop on Role-based access control, RBAC '00, P21, DOI DOI 10.1145/344287.344298
[7]   Decentralized trust management [J].
Blaze, M ;
Feigenbaum, J ;
Lacy, J .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :164-173
[8]  
Bonatti Piero., 2000, CCS 00, P134, DOI DOI 10.1145/352600.352620
[9]   GEO-RBAC: A spatially aware RBAC [J].
Damiani, Maria Luisa ;
Bertino, Elisa ;
Catania, Barbara ;
Perlasca, Paolo .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (01)
[10]  
Healthcare Information and Management Systems Society, 2011, HLTH INF EXCH SIM DI