Activity-based access control model to hospital information

Le Xuan Hung, Sungyoung Lee, Young Koo Lee, Heejo Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

Hospital work is characterized by the need to manage multiple activities simultaneously, constant local mobility, frequently interruptions, and intense collaboration and communication. Hospital employees must handle a large amount of data that is often tied to specific work activities. This calls for a proper access control model. In this paper, we propose a novel approach, Activity-based access Control Model (ACM). Unlike conventional approaches which exploit user identity/role information, ACM leverages user's activities to determine the access permissions for that user. In ACM, a user is assigned to perform a number of actions if s/he poses a set of satisfactory attributes. Access permissions to hospital information are granted according to user's actions. By doing this, ACM contributes a number of advantages over conventional models: (I) facilitates user's work; (2) reduces complexity and cost of access management. Though the design of ACMfirst aims to support clinical works in hospitals, it can be applied in other activity-centered environments.

Original languageEnglish
Title of host publicationProceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007
Pages488-493
Number of pages6
DOIs
Publication statusPublished - 2007
Event4296821 - Daegu, Korea, Republic of
Duration: 2007 Aug 212007 Aug 24

Publication series

NameProceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007

Other

Other4296821
Country/TerritoryKorea, Republic of
CityDaegu
Period07/8/2107/8/24

ASJC Scopus subject areas

  • Computer Science Applications
  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Activity-based access control model to hospital information'. Together they form a unique fingerprint.

Cite this