Skip to main content

An Event-Based, Role-Based Authorization Model for Healthcare Workflow Systems

  • Conference paper
Electronic Healthcare (eHealth 2010)

Abstract

Authorization and access control is of primary importance to workflow healthcare environments. Although task dependencies in the workflow give rise to the need for a specific ordering of task executions, it is authorization that determines who can execute the various tasks that comprise the workflow and what information can be accessed during task executions. Furthermore, a challenge of workflow security is to enforce the least privilege principle (i.e. users must be allowed to receive the least possible permissions required to perform a task) throughout workflow execution in order to reduce the risk of compromising information integrity during task executions. However, adherence to the least privilege principle often requires the enforcement of dynamic, contextual constraints so that authorizations for access to data during task executions are granted to and revoked from users dynamically. This paper discusses an event-based, role-based workflow authorization model and mechanism that addresses this issue. In particular, the model augments the capabilities of traditional role-based access control (RBAC) models by allowing user roles to change dynamically during workflow execution based on the occurrence of specific events, in order to prevent users from acquiring unnecessary privileges during workflow task executions and, hence, synchronizing authorization flow with the progression of the workflow.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abrahams, A.S., Eyers, D.M., Bacon, J.M.: An Event-Based Paradigm for E-Commerce Application Specification and Execution. LNCS Information Security, Technical Report 6(2), 59–68 (2001)

    Google Scholar 

  2. Atluri, V.: Security for Workflow Systems. LNCS Information Security, Technical Report 6(2), 59–68 (2001)

    Google Scholar 

  3. Botha, A.R., Eloff, H.P.: A Framework for Access Control in Workflow Systems. Inform. Manage. Comput. Se. 9(3), 126–133 (2001)

    Google Scholar 

  4. Casati, F., Castano, S., Fugini, M.: Managing Workflow Authorization Constraints through Active Database Technology. Inf. Syst. Front. 3(3), 319–338 (2001)

    Article  Google Scholar 

  5. Dey, A.K., Abowed, G.D.: The Context Toolkit: Aiding the Development of Context-Aware Applications. In: Human Factors in Computing Systems (CHI 1999), Pittsburgh, PA, May 15-20, pp. 434–441 (1999)

    Google Scholar 

  6. Goh, A., Koh, Y.K., Domazet, D.S.: ECA Rule-based Support for Workflows. Artif. Intell Eng. 15, 37–46 (2001)

    Article  Google Scholar 

  7. Lenz, R., Reichert, M.: IT Support for Business processes. In: van der Aalst, W.M.P., Benatallah, B., Casati, F., Curbera, F. (eds.) BPM 2005. LNCS, vol. 3649, pp. 354–363. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Malamateniou, F., Vassilacopoulos, G., Tsanakas, P.: A Workflow Based Approach to Virtual Patient Record Security. IEEE T. Inf. Technol. B. 2(3), 139–145 (1998)

    Article  Google Scholar 

  9. Zhou, X., Wang, Z.: An Access Control Model of Workflow System Integrating RBAC and TBAC. Integration and Innovation Orient to E-Society 2, 246–251 (2008)

    Article  Google Scholar 

  10. Xing, G., Xue, S., Liu, F.: Design of Role-Based Security Access Control Model in the Workflow. In: 1st IEEE International Conference on Information Science and Engineering (ICISE 2009), Nanjing, Jiangsu China, December 26-28, pp. 1711–1715 (2009)

    Google Scholar 

  11. Zhao, H., Fang, Z., Xu, P., Zhao, L., Liu, J., Wang, T.: An Improved Role-Based Workflow Access Control Model. In: 5th International Conference on Information Technology: New Generations (ITNG 2008), Las Vegas, Nevada, USA, April 7-8 (2008)

    Google Scholar 

  12. DeCarlo, A.L.: Dynamic Business Process Management (BPM): Applying a Role-Based Approach to Business Process Management, InformationWeek, Business Technology Network (2009), http://business-agility.techweb.com/articles/02042009.jhtml

  13. Byron, D.: Role-based Business Process Management: A Good Way to Think of BPM, IT Business Edge (2009), http://www.itbusinessedge.com/cm/blogs/byron/role-based-business-process-management-a-good-way-to-think-of-bpm/?cs=34553

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Koufi, V., Malamateniou, F., Mytilinaiou, E., Vassilacopoulos, G. (2011). An Event-Based, Role-Based Authorization Model for Healthcare Workflow Systems. In: Szomszor, M., Kostkova, P. (eds) Electronic Healthcare. eHealth 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 69. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23635-8_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23635-8_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23634-1

  • Online ISBN: 978-3-642-23635-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics