The design and implementation of a log-structured file system
ACM Transactions on Computer Systems (TOCS)
A context-related authorization and access control method based on RBAC:
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Cryptographic access control in a distributed file system
Proceedings of the eighth ACM symposium on Access control models and technologies
PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues
PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues
CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
E-Health Care Information Systems: An Introduction for Students and Professionals
E-Health Care Information Systems: An Introduction for Students and Professionals
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes
IEEE Transactions on Dependable and Secure Computing
A data outsourcing architecture combining cryptography and access control
Proceedings of the 2007 ACM workshop on Computer security architecture
Adaptive Solutions for Access Control within Pervasive Healthcare Systems
ICOST '08 Proceedings of the 6th international conference on Smart Homes and Health Telematics
Behavior-Based Access Control for Distributed Healthcare Environment
CBMS '08 Proceedings of the 2008 21st IEEE International Symposium on Computer-Based Medical Systems
Patient-centric authorization framework for sharing electronic health records
Proceedings of the 14th ACM symposium on Access control models and technologies
Adaptive cryptographic access control for dynamic data sharing environments
Adaptive cryptographic access control for dynamic data sharing environments
Trust and Security in Collaborative Computing
Trust and Security in Collaborative Computing
Elliptic curve for data protection
Proceedings of the 2011 Information Security Curriculum Development Conference
Hi-index | 0.00 |
Access control is the capacity of a particular subject (user, process) to permit or deny the use of a specific object (data, file). Access control mechanisms can be used in managing physical resources and logical resources. Cryptography access control in a healthcare Web system provides logical control for sharing resources and access rights subject to object. However, designing access control for healthcare information systems is difficult due to the culture of the healthcare, the rapid changing, and the tasks performed. This work examined existing access control models, providing a broad presentation for cryptographic algorithms including cryptography access control-based systems. In the last part, a new model is presented based on integrating cryptography access control with role access control and hierarchy using Suite B (NSA recommendation). The model is based on the using entity (which could be a local medical center or hospital), while the security level between entities are distributed and based on PKI.