IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Analysis of Healthcare Workflows in Accordance with Access Control Policies

Analysis of Healthcare Workflows in Accordance with Access Control Policies
View Sample PDF
Author(s): Sandeep Lakaraju (Dakota State University, USA), Dianxiang Xu (Boise State University, USA)and Yong Wang (Dakota State University, USA)
Copyright: 2020
Pages: 23
Source title: Data Analytics in Medicine: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-7998-1204-3.ch069

Purchase

View Analysis of Healthcare Workflows in Accordance with Access Control Policies on the publisher's website for pricing and purchasing information.

Abstract

Healthcare information systems deal with sensitive data across complex workflows. They often allow various stakeholders from different environments to access data across organizational boundaries. This elevates the risk of exposing sensitive healthcare information to unauthorized personnel, leading ‘controlling access to resources' a major concern. To prevent unwanted access to sensitive information, healthcare organizations need to adopt effective workflows and access control mechanisms. Many healthcare organizations are not yet considering or do not know how to accommodate the ‘context' element as a crucial element in their workflows and access control policies. The authors envision the future of healthcare where ‘context' will be considered as a crucial element. They can accommodate context through a new element ‘environment' in workflows, and can accommodate context in policies through well-known attribute based access control mechanism (ABAC). This research mainly addresses these problems by proposing a model to integrate workflows and access control policies and thereby identifying workflow activities that are not being protected by access control policies and improving the workflow activities and/or existing access control policies using SARE (Subject, Action, Resource, and environment) elements.

Related Content

N. Geethanjali, K. M. Ashifa, Avantika Raina, Jayashree Patil, Rameshwaran Byloppilly, S. Suman Rajest. © 2024. 19 pages.
Praveen Kakada, Muhammed Shafi M. K.. © 2024. 14 pages.
P. S. Venkateswaran, Divya Marupaka, Sachin Parate, Amit Bhanushali, Latha Thammareddi, P. Paramasivan. © 2024. 15 pages.
M. Lishmah Dominic, P. S. Venkateswaran, Latha Thamma Reddi, Sandeep Rangineni, R. Regin, S. Suman Rajest. © 2024. 15 pages.
S. Sivabala, P. Vidyasri. © 2024. 23 pages.
H. Hajra, G. Jayalakshmi. © 2024. 22 pages.
Anusha Thakur. © 2024. 15 pages.
Body Bottom