Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Analysis of Healthcare Workflows in Accordance with Access Control Policies

Analysis of Healthcare Workflows in Accordance with Access Control Policies
View Sample PDF
Author(s): Sandeep Lakaraju (Dakota State University, USA), Dianxiang Xu (Boise State University, USA) and Yong Wang (Dakota State University, USA)
Copyright: 2020
Pages: 23
Source title: Information Diffusion Management and Knowledge Sharing: Breakthroughs in Research and Practice
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-7998-0417-8.ch014


View Analysis of Healthcare Workflows in Accordance with Access Control Policies on the publisher's website for pricing and purchasing information.


Healthcare information systems deal with sensitive data across complex workflows. They often allow various stakeholders from different environments to access data across organizational boundaries. This elevates the risk of exposing sensitive healthcare information to unauthorized personnel, leading ‘controlling access to resources' a major concern. To prevent unwanted access to sensitive information, healthcare organizations need to adopt effective workflows and access control mechanisms. Many healthcare organizations are not yet considering or do not know how to accommodate the ‘context' element as a crucial element in their workflows and access control policies. The authors envision the future of healthcare where ‘context' will be considered as a crucial element. They can accommodate context through a new element ‘environment' in workflows, and can accommodate context in policies through well-known attribute based access control mechanism (ABAC). This research mainly addresses these problems by proposing a model to integrate workflows and access control policies and thereby identifying workflow activities that are not being protected by access control policies and improving the workflow activities and/or existing access control policies using SARE (Subject, Action, Resource, and environment) elements.

Related Content

Ramakrishnan Ramanathan, Lok Wan Lorraine Ko, Hsin Chen, Usha Ramanathan. © 2020. 12 pages.
Debra N. Weiss-Randall. © 2020. 14 pages.
Jayne Cubbage. © 2020. 18 pages.
Japhet Eke Lawrence. © 2020. 20 pages.
Amir Manzoor. © 2020. 28 pages.
Shantanu Pal. © 2020. 19 pages.
Martha Garcia-Murillo, Moinul Zaber, Marcio Wohlers de Almeida. © 2020. 22 pages.
Body Bottom