Skip to main content

A Flexible Access Control Model for Multimedia Medical Image Security

  • Conference paper
  • First Online:
Advances in Multimedia Information Processing — PCM 2001 (PCM 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2195))

Included in the following conference series:

  • 802 Accesses

Abstract

Most of the work on multimedia medical images security until now has focused on cryptographic approaches. While valuable, cryptography is not enough to control access to images. Therefore additional protection approaches should be applied at a higher level. Rolebased access control (RBAC) is a good candidate to provide access control in a multimedia medical image DBMS. However, in a multimedia medical image DBMS, specifications of image access rights are often based on the semantic content of the images, the attributes of the user accessing the image, the relationship between the user and the patient whose images are to be accessed and the time. Unfortunately, RBAC cannot be used to handle the above requirements. In this paper we describe an extended RBAC model by using constraints in the specific ation of the Role-Permission relationship. The proposed access control model preserves the advantages of scaleable security administration that RBAC-style models offer and yet offers the flexibility to specify very fine-grained, flexible, content, context and time-based access control policies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. R. B. Wolfang and E. J. Delp, “Overview of image security techniques with applications in multimedia systems”, SPIE Conf. on Multimedia Networks: Security, Displays, Terminals and Gateways, Vol. 3228, November 2–5, 1997, Dallas, Texas, pp:297–3308.

    Google Scholar 

  2. E. B. Fernandez and K. R. Nair, “An Abstract Authorization System for the Internet”, in Proc. of the 9th International Workshop on Database and Expert Systems Applic., 1998.

    Google Scholar 

  3. R. K. Thomas, “Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments”, ACM RBAC‘97, 1997.

    Google Scholar 

  4. L. Giuri and P. Iglio, “Role templates for content-based access control”, in Proc. of the Second ACM RBAC Workshop, November 1997.

    Google Scholar 

  5. E. C. Lupu and M. Sloman, “Reconciling role-based management and role-based access control”, in Proc. of the Second ACM RBAC Workshop, November 1997.

    Google Scholar 

  6. S. T. C. Wong and H. K. Huang, “Design methods and architectural issues of integrated medical image data based systems”, Computerized Medical Imaging and Graphics, Vol 20, No 4, pp. 285–299, 1996.

    Article  Google Scholar 

  7. A. Tchounikine, “Creation and content-based retrieval in a radiological documentary record”, in Proc. of the 3rd Basque International Workshop on Information Technology, 1997.

    Google Scholar 

  8. R. Sandhu, E. J. Coynee, H. L. Feinsteinn, and C. E. Youman, “Role-based access control models”, IEEE Computer, 29(2), February, 1996.

    Google Scholar 

  9. Rational Software Corporation, Object Constraint Language Specification, Version 1.1, Available at http://www.rational.com/uml/, September 1997.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tzelepi, S., Pangalos, G. (2001). A Flexible Access Control Model for Multimedia Medical Image Security. In: Shum, HY., Liao, M., Chang, SF. (eds) Advances in Multimedia Information Processing — PCM 2001. PCM 2001. Lecture Notes in Computer Science, vol 2195. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45453-5_139

Download citation

  • DOI: https://doi.org/10.1007/3-540-45453-5_139

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42680-6

  • Online ISBN: 978-3-540-45453-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics