A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs

  • Authors:
  • Lillian Rostad;Ole Edsberg

  • Affiliations:
  • Norwegian University of Science and Technology (NTNU), Norway;Norwegian University of Science and Technology (NTNU), Norway

  • Venue:
  • ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In healthcare, role-based access control systems are often extended with exception mechanisms to ensure access to needed information even when the needs don't follow the expected patterns. Exception mechanisms increase the threats to patient privacy, and therefore their use should be limited and subject to auditing. We have studied access logs from a hospital EPR system with extensive use of exception-based access control. We found that the uses of the exception mechanisms were too frequent and widespread to be considered exceptions. The huge size of the log and the use of pre-defined or uninformative reasons for access make it infeasible to audit the log for misuse. The informative reasons that were given provided starting points for requirements on how the usage needs should be accomplished without exception-based access. With more structured and fine-grained logging, analysis of access logs could be a very useful tool for learning how to reduce the need for exception-based access.