DOI: 10.1007/978-3-540-69916-3_6
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Solutions for Access Control within Pervasive Healthcare Systems

Abstract: In the age of mobile computing and distributed systems, healthcare systems are employing service-oriented computing to provide users with transparent accessibility to reach their distributed resources at anytime, anywhere and anyhow. Meanwhile, these systems tend to strengthen their security shields to ensure the limitation of access to authorized entities. In this paper, we examine mobile querying of distributed XML databases within a pervasive healthcare system. In such contexts, policies -as XACML -are need… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Following the experience of providing XACML-based adaptive data access in the case of medical emergencies developed in [7] and [8], we will continue the collaboration with our medical partners in order to locate a medical concrete environment suitable to evaluate our proposal.…”
Section: Discussionmentioning
confidence: 98%
See 1 more Smart Citation
“…Following the experience of providing XACML-based adaptive data access in the case of medical emergencies developed in [7] and [8], we will continue the collaboration with our medical partners in order to locate a medical concrete environment suitable to evaluate our proposal.…”
Section: Discussionmentioning
confidence: 98%
“…Knowing that the access denial response can take place in many cases that are not extremely urgent but important enough for the requester, we have proposed in [7] and in [8] an adaptive system that extends the XACML policy and employs a query rewriting mechanism that uses documents similarity to provide the user with alternative documents that are authorized in his context and that could help him perform better patient record consultation. The system exploits the user profile and some predefined semantics to reform and adapt the issued query and provide users with alternative authorized access paths to access requested information.…”
Section: B Applying Ontology-based Xacml Query Rewritingmentioning
confidence: 99%
“…The proposed solution has been validated within the LINDO framework in the context of a video surveillance use case. We applied and validated the same access control approach for other use cases, such as Health care Systems [21]. The adaptive and alternative based situation-aware solution can increase the complexity of processing the request, but if we consider the usefulness of the results provided in real time and the fact they do not violate the access rights defined by the privacy law, this complexity seems quite acceptable.…”
Section: Discussionmentioning
confidence: 99%
“…The dynamic changes were found in typical scenarios but not in unexpected scenarios like emergency or disaster situations. Adaptations to unexpected situations were attempted (Al Kukhun & Sedes, 2008) for flexible authorization and access to provide balanced service solutions. In an emergency/spontaneous coalition situation, access control for unauthorized users was based on policies by dynamic evaluation and adaptation (Mohan & Blough, 2010).…”
Section: Literature Reviewmentioning
confidence: 99%