How to Break Access Control in a Controlled Manner
Citations Over TimeTop 10% of 2006 papers
Abstract
The Electronic Medical Record (EMR) integrates heterogeneous information within a Healthcare Institution stressing the need for security and access control. The Biostatistics and Medical Informatics Department from Porto Faculty of Medicine has recently implemented a Virtual EMR (VEMR) in order to integrate patient information and clinical reports within a university hospital. With more than 500 medical doctors using the system on a daily basis, an access control policy and model were implemented. However, the healthcare environment has unanticipated situations (i.e. emergency situations) where access to information is essential. Most traditional policies do not allow for overriding. A policy that allows for "Break-The-Glass (BTG)" was implemented in order to override access control whilst providing for non-repudiation mechanisms for its usage. The policy was easily integrated within the model confirming its modularity and the fact that user intervention in defining security procedures is crucial to its successful implementation and use.
Related Papers
- → Configuring role-based access control to enforce mandatory and discretionary access control policies(2000)572 cited
- → Enforcing Information Flow Constraints in RBAC Environments(2008)1 cited
- RBAC 데이터베이스의 무결성을 위한 일관성 특성과 관리도구 동작(2000)
- Access control model of workflow permission based on group and role(2011)
- Μοντέλα ελέγχου πρόσβασης βασισμένα σε ρόλους (RBAC) : υλοποίηση με ενσωμάτωση χρονικών περιορισμών για τα Windows(2011)