2018
DOI: 10.14419/ijet.v7i2.8.10520
|View full text |Cite
|
Sign up to set email alerts
|

Evolution of access control models for protection of patient details: a survey

Abstract: Hospitals across the world are adapting to Electronic Hospital Information Systems and are moving away from the manual paper systems to provide patients efficient services. Numerous Access Control Models have been deployed for securing patient privacy one of them being Role Based Access Control Model (RBAC). The current models merely allow access on the basis of roles and role hierarchy without actually understanding the real intention of the person accessing the system. This could lead to a compromise of pati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…First, some studies focus on controlling subjects (users, etc.) such as Discretionary Access Control (DAC) and Role-Based Access Control (RBAC) (Bertino, 2003;Ferraiolo and Kuhn, 1992;Kuhn et al, 2010;Sandhu et al, 1996;2000;United Nations, 2004), while some are about the expansion of such methods (Bertino et al, 2005;Kalinin et al, 2018;Sinha et al, 2018;Zhao and Chen, 2013) Second, techniques such as masking (Mansfield-Devine, 2014), digital watermarking (Kumar, 2019), image fusion (Gupta and Kumar, 2019) and encryption (Davida et al, 1981;Elovici et al, 2004) are aiming at strengthening the security of objects such as data. Third, those that consider both subjects and objects include Mandatory Access Control (MAC).…”
Section: Introductionmentioning
confidence: 99%
“…First, some studies focus on controlling subjects (users, etc.) such as Discretionary Access Control (DAC) and Role-Based Access Control (RBAC) (Bertino, 2003;Ferraiolo and Kuhn, 1992;Kuhn et al, 2010;Sandhu et al, 1996;2000;United Nations, 2004), while some are about the expansion of such methods (Bertino et al, 2005;Kalinin et al, 2018;Sinha et al, 2018;Zhao and Chen, 2013) Second, techniques such as masking (Mansfield-Devine, 2014), digital watermarking (Kumar, 2019), image fusion (Gupta and Kumar, 2019) and encryption (Davida et al, 1981;Elovici et al, 2004) are aiming at strengthening the security of objects such as data. Third, those that consider both subjects and objects include Mandatory Access Control (MAC).…”
Section: Introductionmentioning
confidence: 99%