𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[ACM Press the 2nd ACM workshop - Alexandria, Virginia, USA (2008.10.31-2008.10.31)] Proceedings of the 2nd ACM workshop on Computer security architectures - CSAW '08 - Personalized access control for a personally controlled health record

✍ Scribed by Røstad, Lillian; Nytrø, Øystein


Book ID
121248921
Publisher
ACM Press
Year
2008
Weight
188 KB
Category
Article
ISBN
1605583006

No coin nor oath required. For personal study only.

✦ Synopsis


Access control is a key feature of healthcare systems. Up until recently most healthcare information systems have been local to a healthcare facility and accessible only to clinicians. Currently there is a move towards making health information more accessible to patients. One example is the Personally Controlled Health Record (PCHR) where the patient is in charge of deciding who gets access to the information. In the PCHR the patient is the administrator of access control. While it certainly is possible to create roles representing people most patients would want to share with, like primary physician, it is also likely, and desirable, to afford the patients a high level of control and freedom to be able to create specialized access policies tailored to their personal wishes. We entitle this personalized access control. In this paper we present a semi-formal model for how we believe personalized access control may be realized. The model draws on and combines properties and concepts of both Role-Based Access Control (RBAC) and Discretionary Access Control (DAC) to achieve the desired properties. Throughout the paper we use the PCHR as a motivating example and to explain our reasoning and practical use of the model.


📜 SIMILAR VOLUMES


[ACM Press the 2008 ACM workshop - Alexa
✍ Kerschbaum, Florian; Deitos, Rafael J. 📂 Article 📅 2008 🏛 ACM Press ⚖ 226 KB

Security research has long focused on protecting against outside attackers. This was augmented with protection against insider threats, but recently networked business is emerging. With it a new threat is emerging: security against the business partner. A possible solution is secure multi-party com

[ACM Press the 4th ACM international wor
✍ Wilcox-O'Hearn, Zooko; Warner, Brian 📂 Article 📅 2008 🏛 ACM Press ⚖ 290 KB

Tahoe is a system for secure, distributed storage. It uses capabilities for access control, cryptography for confidentiality and integrity, and erasure coding for fault-tolerance. It has been deployed in a commercial backup service and is currently operational. The implementation is Open Source.