Zili Wu, Xiaoqian Qi, Gang Liu, Lu Fang, Jiayu Liu, Juan Cui
{"title":"An extend RBAC model for privacy protection in HIS","authors":"Zili Wu, Xiaoqian Qi, Gang Liu, Lu Fang, Jiayu Liu, Juan Cui","doi":"10.1109/ISDFS.2018.8355328","DOIUrl":null,"url":null,"abstract":"With the continuous development of Healthcare information systems (HIS) [1], malicious and unauthorized access has increased, privacy disclosure issues gradually serious. In order to protect the privacy of HIS, this paper adds context to privacy information access, proposes a new method to realize context constraints, this method rates the context in which the subject is located, determines whether the access is allowed by judging whether the level satisfies the conditions. By adding context constraints to the access, the risk of privacy disclosure is greatly reduced and privacy protection is realized.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"49 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS.2018.8355328","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
With the continuous development of Healthcare information systems (HIS) [1], malicious and unauthorized access has increased, privacy disclosure issues gradually serious. In order to protect the privacy of HIS, this paper adds context to privacy information access, proposes a new method to realize context constraints, this method rates the context in which the subject is located, determines whether the access is allowed by judging whether the level satisfies the conditions. By adding context constraints to the access, the risk of privacy disclosure is greatly reduced and privacy protection is realized.