2014 IEEE 16th International Conference on E-Health Networking, Applications and Services (Healthcom) 2014
DOI: 10.1109/healthcom.2014.7001829
|View full text |Cite
|
Sign up to set email alerts
|

An evaluation of break-the-glass access control model for medical data in wireless sensor networks

Abstract: Wireless Sensor Networks (WSNs) have recently attracted a lot of attention in the research community because it is easy to deploy them in the physical environment and collect and disseminate environmental data from them. The collected data from sensor nodes can vary based on what kind of application is used for WSNs. Data confidentiality and access control to that collected data are the most challenging issues in WSNs because the users are able to access data from the different location via ad-hoc manner. Acce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…The access control policies are proper techniques used for privacy-preserving. Most of time, hybrid access control policies are adopted to propose a privacy-preserving access control mechanisms [28]- [33]. It is common to use the combination of the access control and the pseudonymization in one privacy-preserving scheme, which stores the users' data in an anonymized manner, and shared the anonymized data according to the access control policies.…”
Section: B Access Control Based Schemes For Ehealthcare Systemmentioning
confidence: 99%
“…The access control policies are proper techniques used for privacy-preserving. Most of time, hybrid access control policies are adopted to propose a privacy-preserving access control mechanisms [28]- [33]. It is common to use the combination of the access control and the pseudonymization in one privacy-preserving scheme, which stores the users' data in an anonymized manner, and shared the anonymized data according to the access control policies.…”
Section: B Access Control Based Schemes For Ehealthcare Systemmentioning
confidence: 99%
“…Also, focused on emergency access to protected EHR information over wireless sensor networks (WSN) that implement RBAC, Maw et al [ 18 ] proposed a “breaking the glass” feature allowing access to a previously blocked object under certain user circumstances and obligations.…”
Section: Literature Review Classificationmentioning
confidence: 99%
“…Although some articles focused only at describing the need of an additional security layer or different access control model combination [ 26 , 29 , 31 ], we can summarize RBAC current adaptation needs as follows: Conditional or emergency access and authorization are delegated. Context- and situation access-based solutions are advocated to be adapted over original RBAC features [ 14 , 16 18 , 32 ] requiring additional user's obligation. Access segmentation and interdomain/federation scenarios are needed.…”
Section: Rbac Current Security Trends and Limitations Mapped On Himentioning
confidence: 99%
See 1 more Smart Citation
“…Allowing roles to take advantage of a broken glass without obligations seems to invite for abuses, which we intend to avoid, but even if we assume an implementation that mimics less faithfully what happens to a real glass (see § 4) Ferreira et al's proposal of the break-the-glass diverges from auto-delegation. There are still other works that define ways to extend BTG-RBAC, but their applicability is limited to specific domains such as Wireless Sensor Networks (Maw et al, 2014) and Cloud Computing (Rajesh and Nayak, 2012). There is no understanding about how break-the-glass and delegation relate in general and in the medical domain in particular.…”
Section: Related Workmentioning
confidence: 99%