Reference Hub4
A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain

A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain

Esraa Omran, Tyrone Grandison, David Nelson, Albert Bokma
Copyright: © 2013 |Volume: 7 |Issue: 3 |Pages: 17
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781466634084|DOI: 10.4018/jisp.2013070103
Cite Article Cite Article

MLA

Omran, Esraa, et al. "A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain." IJISP vol.7, no.3 2013: pp.36-52. http://doi.org/10.4018/jisp.2013070103

APA

Omran, E., Grandison, T., Nelson, D., & Bokma, A. (2013). A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain. International Journal of Information Security and Privacy (IJISP), 7(3), 36-52. http://doi.org/10.4018/jisp.2013070103

Chicago

Omran, Esraa, et al. "A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain," International Journal of Information Security and Privacy (IJISP) 7, no.3: 36-52. http://doi.org/10.4018/jisp.2013070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The importance of electronic healthcare has caused numerous changes in both substantive and procedural aspects of healthcare processes. These changes have produced new challenges for patient privacy and information secrecy. Traditional privacy policies cannot respond to rapidly increased privacy needs of patients in electronic healthcare. Technically enforceable privacy policies are needed in order to protect patient privacy in modern healthcare with its cross-organizational information sharing and decision making. This paper proposes a personal information flow model that proposes a limited number of acts on this type of information. Ontology-classified chains of these acts can be used instead of the “intended business purposes” in the context of privacy access control. This enables the seamless integration of security and privacy into existing healthcare applications and their supporting infrastructures. In this paper, the authors present their idea of a Chain-Based Access Control (ChBAC) mechanism and provide a comparative analysis of it to Role-Based Access Control (RBAC). The evaluation is grounded in the healthcare domain and examines a range of typical access scenarios and approaches.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.