2012 International Conference on Computer Communication and Informatics 2012
DOI: 10.1109/iccci.2012.6158775
|View full text |Cite
|
Sign up to set email alerts
|

Access control for healthcare data using extended XACML-SRBAC model

Abstract: In the modern health service, data are accessed by doctors and nurses using mobile, Personal Digital Assistants, and other electronic handheld devices. An individual's health related information is normally stored in a central health repository and it can be accessed only by authorized doctors. However, this Data is prone to be exposed to a number of mobile attacks while being accessed. This paper proposes a framework of using XACML and XML security to support secure, embedded and fine-grained access control p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…It can also be used to express an architecture and a processing model that describes how to evaluate access requests according to the rules prede ned in access polices. XACML is designed to be suitable for a variety of application environments, such as social networks [8], home automation gateways [25], healthcare domain [10,37,44], distributed systems [31], etc. ALFA.…”
Section: Representing Access Control Policiesmentioning
confidence: 99%
“…It can also be used to express an architecture and a processing model that describes how to evaluate access requests according to the rules prede ned in access polices. XACML is designed to be suitable for a variety of application environments, such as social networks [8], home automation gateways [25], healthcare domain [10,37,44], distributed systems [31], etc. ALFA.…”
Section: Representing Access Control Policiesmentioning
confidence: 99%
“…In [8] the authors also utilize XACML but focus on the privacy of e-Health data within the mobile environment. In contrast to the work presented here, a complete framework is not included and, moreover, the authors choose computationally intensive security mechanisms such as XML encryption digital signatures.…”
Section: Background and Related Workmentioning
confidence: 99%
“…In [11] the authors also utilize XACML but focus on the privacy of e-Health data within the mobile environment. In contrast to the work presented here, a complete framework is not included and, moreover, the authors choose computationally intensive security mechanisms such as XML encryption digital signatures.…”
Section: Related Workmentioning
confidence: 99%