2010
DOI: 10.1016/j.cose.2010.07.001
|View full text |Cite
|
Sign up to set email alerts
|

Access control for smarter healthcare using policy spaces

Abstract: A fundamental requirement for the healthcare industry is that the delivery of care comes first and nothing should interfere with it. As a consequence, the access control mechanisms used in healthcare to regulate and restrict the disclosure of data are often bypassed in case of emergencies. This phenomenon, called "break the glass", is a common pattern in healthcare organizations and, though quite useful and mandatory in emergency situations, from a security perspective, it represents a serious system weakness.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0
1

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(28 citation statements)
references
References 24 publications
0
27
0
1
Order By: Relevance
“…These functions are implemented using the Clark-Wilson model (see [10]). A similar approach is presented by Ardagna et al [2]. They introduce a break-glass approach where an action can be performed by finding a corresponding emergency policy.…”
Section: Comparison Of Break-glass Approachesmentioning
confidence: 99%
“…These functions are implemented using the Clark-Wilson model (see [10]). A similar approach is presented by Ardagna et al [2]. They introduce a break-glass approach where an action can be performed by finding a corresponding emergency policy.…”
Section: Comparison Of Break-glass Approachesmentioning
confidence: 99%
“…In [14], any access is legitimate and is thus granted. A similar approach is presented by Ardagna et al [2]. They introduce a break-glass approach where an action can be performed either by finding a corresponding emergency policy or by granting a break-glass override.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, [6], [7], [8], [9], [10], [11], [12] use the concept of Break-the-Glass (BtG) policies to enforce a more flexible access control. According to this paradigm, when a subject requests an access, the system checks regular access control policies.…”
Section: Introductionmentioning
confidence: 99%