2016 IEEE 18th International Conference on E-Health Networking, Applications and Services (Healthcom) 2016
DOI: 10.1109/healthcom.2016.7749516
|View full text |Cite
|
Sign up to set email alerts
|

An attribute based access control scheme for secure sharing of electronic health records

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(19 citation statements)
references
References 8 publications
0
19
0
Order By: Relevance
“…erefore, more flexible, adaptive, and dynamic access control models are required; some of which are already available in the literature and try to deal with this issue by including characteristics to cope with specific objectives. Attribute-based access control (ABAC) [24] is more flexible than RBAC because it uses the attributes of subjects and objects (instead of roles), together with environmental attributes, to make access decisions. Situation-based access control (SitBAC) [25] defines a situation as an abstract condition composed of user's contexts and related object contexts where patients' data access is permitted or denied, while location-based access control models use geographic information system (GIS) as a support to make the best evaluation regarding location and related parameters [26].…”
Section: Sotraace and Access Controlmentioning
confidence: 99%
“…erefore, more flexible, adaptive, and dynamic access control models are required; some of which are already available in the literature and try to deal with this issue by including characteristics to cope with specific objectives. Attribute-based access control (ABAC) [24] is more flexible than RBAC because it uses the attributes of subjects and objects (instead of roles), together with environmental attributes, to make access decisions. Situation-based access control (SitBAC) [25] defines a situation as an abstract condition composed of user's contexts and related object contexts where patients' data access is permitted or denied, while location-based access control models use geographic information system (GIS) as a support to make the best evaluation regarding location and related parameters [26].…”
Section: Sotraace and Access Controlmentioning
confidence: 99%
“…Pussewalage and Oleshchuk in [21] propose an ABAC scheme for secure sharing of EHR. The scheme uses selective [20] disclosure that meets the security requirement of EHR.…”
Section: B Application Of Abac In Electronic Health Record (Ehr)mentioning
confidence: 99%
“…The authors in [15] implement access revocation by re-encrypting the ciphertexts and updating the users' private keys. For the papers in [19], [21], the attribute authority is responsible for the access revocation process.…”
Section: A Comparison Of the Different Approachesmentioning
confidence: 99%
“…In the last few decades, there have been significant efforts in integrating information and communication technologies (ICT) into healthcare practices [3,]. E-Healthcare is an integration of latest technologies with medical infrastructure which includes the continues monitoring and transfer of health-related issues from patient-centric environment to respective services providers [4], [6]. The volume of the data generated in healthcare industry is rapidly growing.…”
Section: Introductionmentioning
confidence: 99%