Extended model of access control for the library information systems

Author(s):  
Sherbek Normatov ◽  
Marat Rakhmatullaev

What: Healthcare industries have been unified with the advent of cloud computing and Internet of Medical Things in recent past. How: As simplicity in access and transfer of medical reports increased, so does the impact of losing potential information. Adopting a cloud environment has eased the work of medical practitioners and provided world class medical attention to patients from remote corners of a nation. It has added the responsibility of cloud service providers to improvise the existing standards for protecting information in a virtual platform. A number of benefits not limitedto universal access, advice from renowned medical experts for deciding on diagnosis plan, alerting patients and hospitals in real timeand reducing the workload of labor are achieved by cloud environments. Hospital Information Systems (HIS) are the evolved data forms maintained manually in medical institutions and they are preferred in a cloud platform to improve interoperability. The information carried in such medical systems possesses critical information about patients that need to be protected over transmission between independent environments. This becomes a mandatory requirement for designing and implementing an access control mechanism to identify intention of users who enter into the environment. Relaxations in access control architectures will compromise the security of entire architecture and practice. Why: Intention - Demand Tree is proposed in this paper to limit the access rights of users based on their roles, requirements and permissions to monitor the usage of Health Information Systems. Investigative results illustrate that the risks of losing credible information has been limited and convenient than previous standards.


Author(s):  
Michael Decker

Workflow management systems (WfMS) are a special class of information systems (IS) which support the automated enactment of business processes. Meanwhile there are WfMS which allow the execution of tasks using mobile computers like PDA with the ability of wireless data transmission. However, the employment of workflow systems as well as mobile technologies comes along with special security challenges. One way to tackle these challenges is the employment of location-aware access control to enforce rules that describe from which locations a user is allowed to perform which activities. The data model behind access control in termed Access Control Model (ACM). There are special ACM for mobile information systems as well as for WfMS, but no one that addresses mobile as well as workflow specific aspects. In the article we therefore discuss the specific constraints such a model should be able to express and introduce an appropriate ACM. A special focus is on location constraints for individual workflow instances.


Author(s):  
Jin-Hyuk Chung ◽  
Konstadinos G. Goulias

A new method for access management using traffic impact tools is described. The method targets impact assessment of developments combined with large activity centers. The magnitude of impact of large developments necessitates assessment of their regional and local effects on transportation networks. The method described combines regional and local traffic models and uses geographic information systems (GISs) as support tools. It was created as an access control method for computerized models and addresses supply-side transportation improvements (e.g., number of lanes, signalization, and parking controls) and their effect on traffic flow in an attempt to create better quantitative models for congestion management and access control by considering local and regional traffic impacts together. GIS technology enables users to create detailed highway networks for use in regional forecasting models and in smaller traffic simulation models. The data, models, and software used are outlined and an example of application is provided. The initial results show the efficacy of the concept and the resulting models. In the regional model, the new development generates not only new traffic volume on the network, but also route-choice changes influenced by the level of service on the specific corridors in the study area. Another component of the new model is a local model connected to a regional model through interface software. Using Traf-NETSIM, two scenarios were simulated to test the efficacy of this model system. Twenty-four independent simulation runs indicated that the access control scenario results in higher speed and less traffic delay on the primary arterial road.


Sign in / Sign up

Export Citation Format

Share Document