Modelling Context-Aware Security for Electronic Health Records

Modelling Context-Aware Security for Electronic Health Records

Pravin Shetty, Seng Loke
ISBN13: 9781605660509|ISBN10: 1605660507|EISBN13: 9781605660516
DOI: 10.4018/978-1-60566-050-9.ch133
Cite Chapter Cite Chapter

MLA

Shetty, Pravin, and Seng Loke. "Modelling Context-Aware Security for Electronic Health Records." Medical Informatics: Concepts, Methodologies, Tools, and Applications, edited by Joseph Tan, IGI Global, 2009, pp. 1724-1732. https://doi.org/10.4018/978-1-60566-050-9.ch133

APA

Shetty, P. & Loke, S. (2009). Modelling Context-Aware Security for Electronic Health Records. In J. Tan (Ed.), Medical Informatics: Concepts, Methodologies, Tools, and Applications (pp. 1724-1732). IGI Global. https://doi.org/10.4018/978-1-60566-050-9.ch133

Chicago

Shetty, Pravin, and Seng Loke. "Modelling Context-Aware Security for Electronic Health Records." In Medical Informatics: Concepts, Methodologies, Tools, and Applications, edited by Joseph Tan, 1724-1732. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-050-9.ch133

Export Reference

Mendeley
Favorite

Abstract

The Internet has proven to be the most convenient and demanding facility for various types of businesses and transactions for the past few years. In recent years, business information systems have expanded into networks, encompassing partners, suppliers, and customers. There has been a global availability (Anderson, 2001; BSI Global, 2003) of resources over the Internet to satisfy different needs in various fields. The availability factor has called for various security challenges in fields where information is very valuable and not meant for all. Potential threats to information and system security come from a variety of sources. These threats may result in violations to confidentiality, interruptions in information integrity, and possible disruption in the delivery of services. So it is essential to manage the flow of information over the network with the required level of security. There are many security technologies and models that have been introduced which are capable of realizing the functions and objectives of information system security. This article first gives a brief overview of what we term basic security policies of an integrated security model. Then it suggests context-based security policies for a health organization scenario using contextual graphs augmented with details about specific security actions, which relate to the security policies enumerated in the integrated security model. The plan of the article is as follows. We first overview the three concepts in detail and briefly describe the concept of contextual (meta-policy) graphs. We then develop a context-based security meta-policy for securing patient records based on the security policies overviewed and discuss related work, before concluding the paper.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.