de Carvalho Junior et al., 2020 - Google Patents
Towards unobtrusive patient‐centric access‐control for Health Information Systemde Carvalho Junior et al., 2020
- Document ID
- 5185073432246934137
- Author
- de Carvalho Junior M
- Bandiera‐Paiva P
- Publication year
- Publication venue
- Concurrency and Computation: Practice and Experience
External Links
Snippet
Patient consent is currently a missing piece on Health Information Systems (HIS) access permission. The control is needed to ensure personal data as the property of the individual, not data controllers or health‐care service providers. This is a newly‐designed access …
- 239000011159 matrix material 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Guarda et al. | Towards the development of privacy-aware systems | |
Hu et al. | Guide to attribute based access control (ABAC) definition and considerations | |
Hu et al. | Guidelines for access control system evaluation metrics | |
Giorgini et al. | Security and trust requirements engineering | |
Yarmand et al. | Behavior-based access control for distributed healthcare systems | |
Lebre et al. | A cloud-ready architecture for shared medical imaging repository | |
Farhadighalati et al. | A systematic review of access control models: Background, existing research, and challenges | |
Yaqub et al. | Blockchain enabled policy-based access control mechanism to restrict unauthorized access to electronic health records | |
de Carvalho Junior et al. | Towards unobtrusive patient‐centric access‐control for Health Information System | |
Li | Dsap: Data sharing agreement privacy ontology | |
Katehakis et al. | Electronic health record | |
Petritsch | Break-glass: handling exceptional situations in access control | |
Sing | A meta-model driven method for establishing business process compliance to gdpr | |
Røstad | Access control in healthcare information systems | |
Alam et al. | A constraint based role based access control in the SECTET a model-driven approach | |
Ramli | Modelling and Analysing Access Control Policies in XACML 3.0 | |
Alam et al. | Modeling and enforcing advanced access control policies in healthcare systems with SECTET | |
Peyrone | Formal models for consent management in healthcare software system development | |
Mousaid | Toward an Interoperable and Centralized Consent Centric Access Control Model for Healthcare Resources: Model and Implementation | |
Antony | Information Leaks and Limitations of Role-based Access Control Mechanisms: A Qualitative Exploratory Single Case Study | |
Caumanns et al. | IHE IT-infrastructure white paper | |
Munakami | Developing an ABAC-based grant proposal workflow management system | |
Fatema | Adding privacy protection to policy based authorisation systems | |
Tall et al. | Access Control in the Era of Big-Data Driven Models and Simulations | |
Desai | The break-the-glass (BtG) principle in access control |