IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Context-Aware Authorization Model for Process-Oriented Personal Health Record Systems

A Context-Aware Authorization Model for Process-Oriented Personal Health Record Systems
View Sample PDF
Author(s): Eleni Mytilinaiou (University of Piraeus, Greece), Vassiliki Koufi (University of Piraeus, Greece), Flora Matamateniou (University of Piraeus, Greece)and George Vassilacopoulos (University of Piraeus, Greece)
Copyright: 2011
Pages: 20
Source title: Certification and Security in Health-Related Web Applications: Concepts and Solutions
Source Author(s)/Editor(s): Anargyros Chryssanthou (Hellenic Data Protection Authority, Greece), Ioannis Apostolakis (National School of Public Health, Greece)and Iraklis Varlamis (Harokopio University of Athens, Greece)
DOI: 10.4018/978-1-61692-895-7.ch003

Purchase

View A Context-Aware Authorization Model for Process-Oriented Personal Health Record Systems on the publisher's website for pricing and purchasing information.

Abstract

Healthcare delivery is a highly complex process involving a broad range of healthcare services, typically performed by a number of geographically distributed and organizationally disparate healthcare providers requiring increased collaboration and coordination of their activities in order to provide shared and integrated care. Under an IT-enabled, patient-centric model, health systems can integrate care delivery across the continuum of services, from prevention to follow-up, and also coordinate care across all settings. In particular, much potential can be realized if cooperation among disparate healthcare organizations is expressed in terms of cross-organizational healthcare processes, where information support is provided by means of Personal Health Record (PHR) systems. This chapter assumes a process-oriented PHR system and presents a security framework that addresses the authorization and access control issues arisen in these systems. The proposed framework ensures provision of tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom