2016
DOI: 10.1007/s10916-016-0630-2
|View full text |Cite
|
Sign up to set email alerts
|

Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare

Abstract: Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 31 publications
0
11
0
1
Order By: Relevance
“…Also, the use of the Internet enhances information communication of these systems, but increases risk due to multiple networks and heterogonous users involved 24. This contributes to the challenge of integrating secure and privacy-preserving systems 25. Hence, a system with high security and excellent protection strategies is required to protect against potential breaches, which benefits the patients and improves overall quality 24…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, the use of the Internet enhances information communication of these systems, but increases risk due to multiple networks and heterogonous users involved 24. This contributes to the challenge of integrating secure and privacy-preserving systems 25. Hence, a system with high security and excellent protection strategies is required to protect against potential breaches, which benefits the patients and improves overall quality 24…”
Section: Resultsmentioning
confidence: 99%
“…The access control features should include elements of robustness, flexibility, and conformity. First, the system has to be robust enough to prevent the exploitation of sensitive and private data by maintaining inappropriate and unauthorized access 25. Second, related to emergency cases, access to the control system has to be flexible to allow overriding and delegation access privileges 25.…”
Section: Resultsmentioning
confidence: 99%
“…Moreover, in the context of healthcare and e-healthcare systems (as a typical critical infrastructures), access control solutions should be rigorous to ensure a higher protection and flexible to treat emergency cases. We check that the simultaneous coupling of two necessary but contradictory objectives (robustness and flexibility) has a direct influence and a wide impact on the compliance of the deployed access control policy [17].…”
Section: Compliance Managementmentioning
confidence: 99%
“…Moreover, in particular applications such as ubiquitous healthcare and e-healthcare systems, the access control process has to be (at the same time) rigorous to ensure a high level of protection and flexible to treat emergency situations. We verify that coupling two requisite but contradictory objectives (robustness and flexibility) has a direct influence and a wide impact on the compliance of the access control infrastructure [7]. In the context of private databases (used to structure and store collected sensitive and private data about critical and classified environments in cyberphysical infrastructures), typical scenarios of noncompliance between a concrete policy and its specification [8] are defined as follows:…”
Section: Introductionmentioning
confidence: 99%