Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment

@article{Azkia2010ReconcilingIP,
  title={Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment},
  author={Hanieh Azkia and Nora Cuppens-Boulahia and Fr{\'e}d{\'e}ric Cuppens and Gouenou Coatrieux},
  journal={2010 Sixth International Conference on Information Assurance and Security},
  year={2010},
  pages={197-203}
}
Traditional access control mechanisms prevent illegal access by controlling access right before executing an action; they belong to a class of a priori security solutions and, from this point of view, they have some limitations, like inflexibility in unanticipated circumstances. By contrast, a posteriori mechanisms enforce policies not by preventing unauthorized access, but rather by deterring it. Such access control needs evidence to prove violations. Evidence is derived from one or several… CONTINUE READING

Citations

Publications citing this paper.

International Symposium on Data-Driven Process Discovery and Analysis

Paolo Ceravolo Philippe Cudré - Mauroux Dragan Gašević
2012
View 4 Excerpts
Highly Influenced

References

Publications referenced by this paper.
Showing 1-10 of 10 references

An audit logic for accountability

Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05) • 2005
View 5 Excerpts
Highly Influenced

Reliable Delivery for syslog

View 3 Excerpts
Highly Influenced

Audit-Based Access Control for Electronic Health Records

Electr. Notes Theor. Comput. Sci. • 2007
View 1 Excerpt

Modeling contextual security policies

International Journal of Information Security • 2007
View 3 Excerpts

Secure Computer System: Unified Exposition and Multics Interpretation

D. Bell, L. LaPadula
Technical Report ESD- TR-75-306, • 1975
View 2 Excerpts

Similar Papers

Loading similar papers…