2013
DOI: 10.1002/sec.817
|View full text |Cite
|
Sign up to set email alerts
|

Role‐based and time‐bound access and management of EHR data

Abstract: Security and privacy are widely recognized as important requirements for access and management of electronic health record (EHR) data. In this paper, we argue that EHR data need to be managed with customizable access control in both spatial and temporal dimensions. We present a role‐based and time‐bound access control (RBTBAC) model that provides more flexibility in both roles (spatial capability) and time (temporal capability) dimensions to control the access of sensitive data. Through algorithmic combination… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(24 citation statements)
references
References 32 publications
(45 reference statements)
0
24
0
Order By: Relevance
“…Another approach presented by Zhang et al [24] is a timebased approach. The approach is efficient in ensuring the privacy of the EHRs at the cloud storage and enhances the operation of key distribution between trusted parties.…”
Section: Related Workmentioning
confidence: 99%
“…Another approach presented by Zhang et al [24] is a timebased approach. The approach is efficient in ensuring the privacy of the EHRs at the cloud storage and enhances the operation of key distribution between trusted parties.…”
Section: Related Workmentioning
confidence: 99%
“…A role based access control system called RBTBAC (Role Based Time Bound Access Control) model is proposed for electronic health record datasets [33]. Every user has some role, which could be that of a doctor, patient or staff.…”
Section: Current Proposed Solutionsmentioning
confidence: 99%
“…Furthermore, the next important issue regarding the encryption as well as access control is known as key management as the mechanisms used for key management mechanisms may provide good access control to the data that are being outsourced on CSPs [4]. There are many methods suggested for exploiting the hierarchical together with other relationships taking place among several items of data so as to minimize the number of distributed keys and make key management more simple [4] [5] [7] [8] [11].…”
Section: Introductionmentioning
confidence: 99%
“…There are many methods suggested for exploiting the hierarchical together with other relationships taking place among several items of data so as to minimize the number of distributed keys and make key management more simple [4] [5] [7] [8] [11]. In other words, in the event of changing access control policies for these methods or approaches, the key distribution should be carried out once again in order to ascertain that authorized users are only allowed to access.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation