Reference Hub1
Analysis of Healthcare Workflows in Accordance with Access Control Policies

Analysis of Healthcare Workflows in Accordance with Access Control Policies

Sandeep Lakaraju, Dianxiang Xu, Yong Wang
Copyright: © 2016 |Volume: 11 |Issue: 1 |Pages: 20
ISSN: 1555-3396|EISSN: 1555-340X|EISBN13: 9781466689602|DOI: 10.4018/IJHISI.2016010101
Cite Article Cite Article

MLA

Lakaraju, Sandeep, et al. "Analysis of Healthcare Workflows in Accordance with Access Control Policies." IJHISI vol.11, no.1 2016: pp.1-20. http://doi.org/10.4018/IJHISI.2016010101

APA

Lakaraju, S., Xu, D., & Wang, Y. (2016). Analysis of Healthcare Workflows in Accordance with Access Control Policies. International Journal of Healthcare Information Systems and Informatics (IJHISI), 11(1), 1-20. http://doi.org/10.4018/IJHISI.2016010101

Chicago

Lakaraju, Sandeep, Dianxiang Xu, and Yong Wang. "Analysis of Healthcare Workflows in Accordance with Access Control Policies," International Journal of Healthcare Information Systems and Informatics (IJHISI) 11, no.1: 1-20. http://doi.org/10.4018/IJHISI.2016010101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Healthcare information systems deal with sensitive data across complex workflows. They often allow various stakeholders from different environments to access data across organizational boundaries. This elevates the risk of exposing sensitive healthcare information to unauthorized personnel, leading ‘controlling access to resources' a major concern. To prevent unwanted access to sensitive information, healthcare organizations need to adopt effective workflows and access control mechanisms. Many healthcare organizations are not yet considering or do not know how to accommodate the ‘context' element as a crucial element in their workflows and access control policies. The authors envision the future of healthcare where ‘context' will be considered as a crucial element. They can accommodate context through a new element ‘environment' in workflows, and can accommodate context in policies through well-known attribute based access control mechanism (ABAC). This research mainly addresses these problems by proposing a model to integrate workflows and access control policies and thereby identifying workflow activities that are not being protected by access control policies and improving the workflow activities and/or existing access control policies using SARE (Subject, Action, Resource, and environment) elements.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.