IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Modelling Context-Aware Security for Electronic Health Records

Modelling Context-Aware Security for Electronic Health Records
View Sample PDF
Author(s): Pravin Shetty (Monash University, Australia)and Seng Loke (La Trobe University, Australia)
Copyright: 2009
Pages: 9
Source title: Medical Informatics: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Joseph Tan (McMaster University, Canada)
DOI: 10.4018/978-1-60566-050-9.ch133

Purchase

View Modelling Context-Aware Security for Electronic Health Records on the publisher's website for pricing and purchasing information.

Abstract

The Internet has proven to be the most convenient and demanding facility for various types of businesses and transactions for the past few years. In recent years, business information systems have expanded into networks, encompassing partners, suppliers, and customers. There has been a global availability (Anderson, 2001; BSI Global, 2003) of resources over the Internet to satisfy different needs in various fields. The availability factor has called for various security challenges in fields where information is very valuable and not meant for all. Potential threats to information and system security come from a variety of sources. These threats may result in violations to confidentiality, interruptions in information integrity, and possible disruption in the delivery of services. So it is essential to manage the flow of information over the network with the required level of security. There are many security technologies and models that have been introduced which are capable of realizing the functions and objectives of information system security. This article first gives a brief overview of what we term basic security policies of an integrated security model. Then it suggests context-based security policies for a health organization scenario using contextual graphs augmented with details about specific security actions, which relate to the security policies enumerated in the integrated security model. The plan of the article is as follows. We first overview the three concepts in detail and briefly describe the concept of contextual (meta-policy) graphs. We then develop a context-based security meta-policy for securing patient records based on the security policies overviewed and discuss related work, before concluding the paper.

Related Content

David Edson Ribeiro, Valter Augusto de Freitas Barbosa, Clarisse Lins de Lima, Ricardo Emmanuel de Souza, Wellington Pinheiro dos Santos. © 2021. 15 pages.
Juliana Carneiro Gomes, Maíra Araújo de Santana, Clarisse Lins de Lima, Ricardo Emmanuel de Souza, Wellington Pinheiro dos Santos. © 2021. 12 pages.
Maíra Araújo de Santana, Jessiane Mônica Silva Pereira, Clarisse Lins de Lima, Maria Beatriz Jacinto de Almeida, José Filipe Silva de Andrade, Thifany Ketuli Silva de Souza, Rita de Cássia Fernandes de Lima, Wellington Pinheiro dos Santos. © 2021. 19 pages.
Jessiane Mônica Silva Pereira, Maíra Araújo de Santana, Clarisse Lins de Lima, Rita de Cássia Fernandes de Lima, Sidney Marlon Lopes de Lima, Wellington Pinheiro dos Santos. © 2021. 25 pages.
Adriel dos Santos Araujo, Roger Resmini, Maira Beatriz Hernandez Moran, Milena Henriques de Sousa Issa, Aura Conci. © 2021. 35 pages.
Abir Baâzaoui, Walid Barhoumi. © 2021. 21 pages.
Marcus Costa de Araújo, Luciete Alves Bezerra, Kamila Fernanda Ferreira da Cunha Queiroz, Nadja A. Espíndola, Ladjane Coelho dos Santos, Francisco George S. Santos, Rita de Cássia Fernandes de Lima. © 2021. 44 pages.
Body Bottom