2014
DOI: 10.1007/978-3-662-44300-2_2
|View full text |Cite
|
Sign up to set email alerts
|

Generating XACML Enforcement Policies for Role-Based Access Control of XML Documents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Finally, HIE architectures also require a strong support for privacy and security, since they are tasked with processing highly sensitive data that is subject to regulations such as HIPAA (HIPAA, 1996) and FERPA (FERPA, 1974). Towards this goal, the architecture should implement a single point of entry to handle security, utilizing fine grained role and permission management for medical documents (De La Rosa Algarín, Demurjian, Berhe, & Pavlich-Mariscal, 2012;De La Rosa Algarín, Ziminski, Demurjian, Kuykendall, & Rivera Sánchez, 2013).…”
Section: Challenges For Hie Architecturesmentioning
confidence: 99%
“…Finally, HIE architectures also require a strong support for privacy and security, since they are tasked with processing highly sensitive data that is subject to regulations such as HIPAA (HIPAA, 1996) and FERPA (FERPA, 1974). Towards this goal, the architecture should implement a single point of entry to handle security, utilizing fine grained role and permission management for medical documents (De La Rosa Algarín, Demurjian, Berhe, & Pavlich-Mariscal, 2012;De La Rosa Algarín, Ziminski, Demurjian, Kuykendall, & Rivera Sánchez, 2013).…”
Section: Challenges For Hie Architecturesmentioning
confidence: 99%
“…The patient version of Personal Health Assistant allows users to perform a set of actions regarding their health information. Users can view and edit their medication list, allergies, observations of daily living, and set security policies for read/ write permissions on their medical providers by role as reported in our prior work (De la Rosa Algarín et al, 2013). Security settings can be set at a fine granular level, and each provider gets specific view/update authorizations to the different information components available in Personal Health Assistant.…”
Section: Proposed Architecture For Secure Digital Health Carementioning
confidence: 99%
“…Extension parameters include patient, healthcare facility, task, temporal information, and other stakeholders (Berhe et al, 2010;Caine et al, 2013). Another extension would be the ability to extract local security policies and integrate them into a global one that is enforceable across the health care enterprise (Bhatti et al, 2005;De la Rosa Algarín, 2013).…”
Section: Direct and Health Information Servicementioning
confidence: 99%
“…Venkatasubramanian et al [10] proposed an Adaptive and proactive Access Control Approach for Emergencies in Smart Infrastructures. Algarín A et al [11] generated XACML enforcement policies for role-based access control of XML documents. Hao H et al [12] proposed API-level access control in smartphone analysis.…”
Section: Introductionmentioning
confidence: 99%