A Workflow-Based Access Control Framework for e-Health Applications

@article{Russello2008AWA,
  title={A Workflow-Based Access Control Framework for e-Health Applications},
  author={Giovanni Russello and Changyu Dong and Naranker Dulay},
  journal={22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)},
  year={2008},
  pages={111-120}
}
In this paper, we present a framework where access rights are provided to entities on the basis of the actual task that the entities must fulfill as part of their duties. For capturing the requirements of entities' duties we use the notion of workflow. Our main aim is to provide an access control mechanism that is able to balance the competing goals of flexibility and security. As the main beneficiary of our approach we consider e-Health Applications, where flexibility and security are major… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 21 CITATIONS

Combining Task- and Role-Based Access Control with Multi-Constraints for a Medical Workflow System

  • 2013 International Conference on IT Convergence and Security (ICITCS)
  • 2013
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Semantic Security for E-Health: A Case Study in Enhanced Access Control

  • 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)
  • 2015
VIEW 1 EXCERPT
CITES BACKGROUND

Toward resolving access control policy conflict in inter-organizational workflows

  • 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA)
  • 2015
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 30 REFERENCES

Evaluating acute abdominal pain in adults.

  • JAAPA : official journal of the American Academy of Physician Assistants
  • 2005
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Role-Based Access Control

  • Encyclopedia of Cryptography and Security
  • 2003
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs

  • 2006 22nd Annual Computer Security Applications Conference (ACSAC'06)
  • 2006
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Authorisation and Conflict Resolution for Hierarchical Domains

  • Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)
  • 2007
VIEW 1 EXCERPT

An authorization and access control model for workflow

  • First International Symposium on Control, Communications and Signal Processing, 2004.
  • 2004
VIEW 1 EXCERPT

Similar Papers