[go: up one dir, main page]

de Carvalho Junior et al., 2020 - Google Patents

Towards unobtrusive patient‐centric access‐control for Health Information System

de Carvalho Junior et al., 2020

Document ID
5185073432246934137
Author
de Carvalho Junior M
Bandiera‐Paiva P
Publication year
Publication venue
Concurrency and Computation: Practice and Experience

External Links

Snippet

Patient consent is currently a missing piece on Health Information Systems (HIS) access permission. The control is needed to ensure personal data as the property of the individual, not data controllers or health‐care service providers. This is a newly‐designed access …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Guarda et al. Towards the development of privacy-aware systems
Hu et al. Guide to attribute based access control (ABAC) definition and considerations
Hu et al. Guidelines for access control system evaluation metrics
Giorgini et al. Security and trust requirements engineering
Yarmand et al. Behavior-based access control for distributed healthcare systems
Lebre et al. A cloud-ready architecture for shared medical imaging repository
Farhadighalati et al. A systematic review of access control models: Background, existing research, and challenges
Yaqub et al. Blockchain enabled policy-based access control mechanism to restrict unauthorized access to electronic health records
de Carvalho Junior et al. Towards unobtrusive patient‐centric access‐control for Health Information System
Li Dsap: Data sharing agreement privacy ontology
Katehakis et al. Electronic health record
Petritsch Break-glass: handling exceptional situations in access control
Sing A meta-model driven method for establishing business process compliance to gdpr
Røstad Access control in healthcare information systems
Alam et al. A constraint based role based access control in the SECTET a model-driven approach
Ramli Modelling and Analysing Access Control Policies in XACML 3.0
Alam et al. Modeling and enforcing advanced access control policies in healthcare systems with SECTET
Peyrone Formal models for consent management in healthcare software system development
Mousaid Toward an Interoperable and Centralized Consent Centric Access Control Model for Healthcare Resources: Model and Implementation
Antony Information Leaks and Limitations of Role-based Access Control Mechanisms: A Qualitative Exploratory Single Case Study
Caumanns et al. IHE IT-infrastructure white paper
Munakami Developing an ABAC-based grant proposal workflow management system
Fatema Adding privacy protection to policy based authorisation systems
Tall et al. Access Control in the Era of Big-Data Driven Models and Simulations
Desai The break-the-glass (BtG) principle in access control