Toward a Privacy Preserving HIPAA-compliant Access Control Model for Web Services

被引:0
作者
Alshugran, Tariq [1 ]
Dichter, Julius [1 ]
机构
[1] Univ Bridgeport, Bridgeport, CT 06604 USA
来源
2014 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT) | 2014年
关键词
Data privacy; Web services; HIPAA; Access control;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Most of the modern health-related information is collected, maintained, and accessed through computerized systems. However, the interaction with this information needs to comply with the U.S. federal regulations such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Due to the complexity of healthcare regulations, it's not easy to deploy a complaint system, especially for heterogeneous systems designed to allow data transfer and communication. Web services can be used to solve the problem of incompatible systems intercommunication; however, a generic model for HIPAA enforcement is required. In this paper we propose a generic HIPAA complaint privacy access control model for web services that can be easily applied to any existing covered entity web services.
引用
收藏
页码:163 / 167
页数:5
相关论文
共 17 条
  • [1] A security policy model for clinical information systems
    Anderson, RJ
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 30 - 43
  • [2] [Anonymous], IMIA COD ETH HLTH IN
  • [3] [Anonymous], 2010, PROC 9 ANN ACM WORKS, DOI [10.1145/1866919.1866930, DOI 10.1145/1866919.1866930]
  • [4] [Anonymous], 2004, W3C Constraints and Capabilities Workshop, V9, P1
  • [5] Backes M, 2003, LECT NOTES COMPUT SC, V2808, P162
  • [6] Privacy and contextual integrity: Framework and applications
    Barth, Adam
    Datta, Anupam
    Mitchell, John C.
    Nissenbaum, Helen
    [J]. 2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 184 - +
  • [7] Developing enterprise web services and applications: Opportunities and best practices for the healthcare industry
    Chatterjee, S
    [J]. HEALTHCOM 2003, PROCEEDINGS, 2003, : 159 - 159
  • [8] Cranor L., 2002, ACM workshop on Privacy in the Electronic Society, P1, DOI DOI 10.1145/644527.644528
  • [9] David R. C., 2007, ROLE BASED ACCESS CO, P148
  • [10] Dwyer SamuelJ., 2004, Security Issues in the Digital Medical Enterprise, V72, P9