Academia.eduAcademia.edu

Outline

Access Control for Healthcare Data Using Extended XACML-SRBAC Mode

l”. In the Proceedings of the 2012 International Conference on Computer Communication and Informatics (ICCCI-2012), Jan. 10 – 12, 2012, Coimbatore, INDIA. The proceeding published in IEEEXplore

Abstract

In the modern health service, data are accessed by doctors and nurses using mobile, Personal Digital Assistants, and other electronic handheld devices. An individual's health related information is normally stored in a central health repository and it can be accessed only by authorized doctors. However, this Data is prone to be exposed to a number of mobile attacks while being accessed. This paper proposes a framework of using XACML and XML security to support secure, embedded and fine-grained access control policy to control the privacy and data access of health service data accessed through handheld devices. Also we consider one of the models, namely Spatial Role-based access control (SRBAC) and model it using XACML.

References (10)

  1. Sun's XACML Implementation Programmer's Guide for Version 1.2. July 11, 2004.http://sunxacml.sourceforge.net/ guide.htm.
  2. M. Aburahma and R. Stumptner. Modeling Location Attributes Using XACML-RBAC Model. In Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia, pages 251-254, 2009.
  3. A. Ekelhart, S. Fenz, G. Goluch, M. Steinkellner, and E. Weippl. Xml security a comparative literature review. The Journal of Systems and Software, vol. 81(10):1715-1724, Oct., 2008.
  4. eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard, 1 Feb 2005, http://docs.oasis- open.org/xacml/2.0/ access control-xacml-2.0-core-spec- os.pdf.
  5. A. Giambruno, M. A. Shibli, S. Muftic, and A. Lioy. MagicNET: XACML Authorization Policies for Mobile Agents. In Proceedings of the International Conference on Internet Technology and Secured Transactions (ICITST), pages 1-7, 2009.
  6. G. Hsieh, K. Fostera, G. Emamalia, G. Patricka, and L. Marvelb. Using XACML for Embedded and Fine-Grained Access Control Policy. In Proceedings of the International Conference on Availability, Reliability and Security (ARES), pages 462 -468, 16-19 March, 2009.
  7. G. Hsieh, R. Meeks, and L. Marvel. Supporting Secure Embedded Access Control Policy with XACML+XML Security. In Proceedings of the 5th International Conference on Future Information Technology (FutureTech), pages 1-6, 21- 23 May, 2010.
  8. M. Rajarajan S. Arunkumar. Healthcare Data Access Control using XACML for Handheld Devices. In Proceedings of the Developments in E-systems Engineering (DESE), pages 35 -38, 6-8 Sept, 2010.
  9. XML Encryption Syntax and Processing. W3C Recommendation, 10 Dec 2002, http://www.w3.org/TR/Xmlenc-core.
  10. XML-Signature Syntax and Processing. W3C Recommendation, 12 February 2002,http://www.w3.org/TR/xmldsig-core.