How to Break Access Control in a Controlled Manner
The electronic medical record (EMR) integrates heterogeneous information within a healthcare institution stressing the need for security and access control. The Biostatistics and Medical Informatics Department from Porto Faculty of Medicine has recently implemented a virtual EMR (VEMR) in order to i...
Saved in:
Published in | 19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06) pp. 847 - 854 |
---|---|
Main Authors | , , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
2006
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The electronic medical record (EMR) integrates heterogeneous information within a healthcare institution stressing the need for security and access control. The Biostatistics and Medical Informatics Department from Porto Faculty of Medicine has recently implemented a virtual EMR (VEMR) in order to integrate patient information and clinical reports within a university hospital. With more than 500 medical doctors using the system on a daily basis, an access control policy and model were implemented. However, the healthcare environment has unanticipated situations (i.e. emergency situations) where access to information is essential. Most traditional policies do not allow for overriding. A policy that allows for "Break-The-Glass (BTG)" was implemented in order to override access control whilst providing for non-repudiation mechanisms for its usage. The policy was easily integrated within the model confirming its modularity and the fact that user intervention in defining security procedures is crucial to its successful implementation and use |
---|---|
ISBN: | 9780769525174 0769525172 |
ISSN: | 1063-7125 |
DOI: | 10.1109/CBMS.2006.95 |