Anonymity Preserving Authorization Granting in Medical Information Networks

نویسندگان

  • Sigurd Eskeland
  • Vladimir A. Oleshchuk
چکیده

Due to the sensitivity of personal medical information, this paper addresses the need of hiding patient identities — in contrast to only keeping their medical data confidential. Thus, it is desirable that personal and meaningful patient identity information like names, addresses, personal identity numbers, etc., are not to be linked to disclosed electronic patient records (EPR). To achieve this, we propose a scheme that enables patients to anonymously grant medical teams authorization to access their EPRs without revealing their identities to the teams providing medical care. An essential benefit is that it enables patients to exert control over their own medical data. A security evaluation is included.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal Authorisation Allocation Approaches for Permission-role Assignment Using Relational Algebra Operations

In this paper, we develop formal authorization allocation algorithms for permission-role assignments. The formal approaches are based on relational structure, and relational algebra and operations. The process of permission-role assignments is an important issue in role-based access control (RBAC) as it may modify the authorization level or imply high-level confidential information to be derive...

متن کامل

Advanced Permission-Role Relationship in Role-Based Access Control

Permission-role assignment is an important issue in rolebased access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is related to authorization granting process. Conflicting permissions may be granted to a role, and as a result, users with the role may have or derive a high level of authority. The other is related to authorization revocation. W...

متن کامل

Formal Authorization Allocation Approaches for Role-Based Access Control Based on Relational Algebra Operations

In this paper, we develop formal authorization allocation algorithms for role-based access control (RBAC). The formal approaches are based on relational structure, and relational algebra and operations. The process of user-role assignments is an important issue in RBAC because it may modify the authorization level or imply high-level confidential information to be derived while users change pos...

متن کامل

Role Based Authorization as a Tool for Privacy and Anonymity

The advent of the information age has brought a proliferation in the amount of information that is available and an increase in accessibility to such information. As we rely more heavily on networks as a means of communicating, we must increasingly consider how these networks store and distribute this information. Aside from the problems that arise in managing the security of large diverse syst...

متن کامل

Privacy-preserving Pki Design Based on Group Signature

Nowadays, Internet becomes a part of our life. We can make use of numerous services with personal computer, lap-top, tablet, smart phone or smart TV. These devices with network make us enjoy ubiquitous computing life. Sometimes, on-line services request us authentication or identification for access control and authorization, and PKI technology is widely used because of its security. However th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006