2003
DOI: 10.1007/3-540-45067-x_35
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems

Abstract: Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual's personal health information requires their informed consent, health care information networks need an access control framework that can capture and enforce individual access policies tailored to the specific circumstances of each consumer. Role Based Access Control (RBAC) is examined as a candidate access control framework. While it is well suited to the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
1

Year Published

2006
2006
2012
2012

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 37 publications
(22 citation statements)
references
References 12 publications
0
18
0
1
Order By: Relevance
“…As a solution, they propose adding a middle layer of logic, which translates constraints into access rules. Reid et al [10] adapt role-based access control (RBAC) to include explicit consent and denial. Explicit denial is to grant access to a role (e.g., doctors), but deny access to a particular individual (excluding a particular doctor); explicit consent is the converse property: granting access for individuals while denying access to the role.…”
Section: Enabling Patient Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…As a solution, they propose adding a middle layer of logic, which translates constraints into access rules. Reid et al [10] adapt role-based access control (RBAC) to include explicit consent and denial. Explicit denial is to grant access to a role (e.g., doctors), but deny access to a particular individual (excluding a particular doctor); explicit consent is the converse property: granting access for individuals while denying access to the role.…”
Section: Enabling Patient Privacymentioning
confidence: 99%
“…Currently, (patient) privacy is usually described in terms of protection of information and in terms of controlling access to services. Thus, it is commonly achieved in practice by means of a form of access control or authentication (e.g., see [8][9][10][11][12]). However, typical eHealth systems, especially in future, will be highly distributed and require interoperability of many subsystems.…”
Section: Introductionmentioning
confidence: 99%
“…This section illustrates how the qualifications can be constructed for two of the most famous access control models: role-based access control (RBAC) [12] and Bell-LaPadula (BLP) [20], which have been used extensively in the medical [21,24] and the military environments, respectively.…”
Section: Applicationsmentioning
confidence: 99%
“…There have been some work on security policies in the field of Electronic health records systems in the past years. Reid et al [16] present a model that uses role based access control to restrict the access to the health records on a need-to-know basis. The prototype described maintains databases consisting of explicit allow and explicit denial lists.…”
Section: Related Workmentioning
confidence: 99%