Reference Hub1
Hierarchy Similarity Analyser-An Approach to Securely Share Electronic Health Records

Hierarchy Similarity Analyser-An Approach to Securely Share Electronic Health Records

Shalini Bhartiya, Deepti Mehrotra, Anup Girdhar
Copyright: © 2016 |Volume: 7 |Issue: 2 |Pages: 16
ISSN: 1947-315X|EISSN: 1947-3168|EISBN13: 9781466691919|DOI: 10.4018/IJEHMC.2016040102
Cite Article Cite Article

MLA

Bhartiya, Shalini, et al. "Hierarchy Similarity Analyser-An Approach to Securely Share Electronic Health Records." IJEHMC vol.7, no.2 2016: pp.14-29. http://doi.org/10.4018/IJEHMC.2016040102

APA

Bhartiya, S., Mehrotra, D., & Girdhar, A. (2016). Hierarchy Similarity Analyser-An Approach to Securely Share Electronic Health Records. International Journal of E-Health and Medical Communications (IJEHMC), 7(2), 14-29. http://doi.org/10.4018/IJEHMC.2016040102

Chicago

Bhartiya, Shalini, Deepti Mehrotra, and Anup Girdhar. "Hierarchy Similarity Analyser-An Approach to Securely Share Electronic Health Records," International Journal of E-Health and Medical Communications (IJEHMC) 7, no.2: 14-29. http://doi.org/10.4018/IJEHMC.2016040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Health professionals need an access to various dimensions of Electronic Health Records (EHR). Depending on technical constraints, each organization defines its own access control schema exhibiting heterogeneity in organizational rules and policies. Achieving interoperability between such schemas often result in contradictory rules thereby exposing data to undue disclosures. Permitting interoperable sharing of EHRs and simultaneously restricting unauthorized access is the major objective of this paper. An Extensible Access Control Markup Language (XACML)-based framework, Hierarchy Similarity Analyser (HSA), is proposed which fine-grains access control policies of disparate healthcare organizations to achieve interoperable and secured sharing of EHR under set authorizations. The proposed framework is implemented and verified using automated Access Control Policy Testing (ACPT) tool developed by NIST. Experimental results identify the users receive secured and restricted access as per their authorizations and role hierarchy in the organization.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.