scholarly journals The Australian PCEHR System: Ensuring Privacy and Security through an Improved Access Control Mechanism

2016 ◽  
Vol 3 (8) ◽  
pp. 151633
Author(s):  
P. Vimalachandran ◽  
H. Wang ◽  
Y. Zhang ◽  
G. Zhuo
Author(s):  
Vassiliki Koufi ◽  
Flora Malamateniou ◽  
George Vassilacopoulos

Healthcare is an increasingly collaborative enterprise involving many individuals and organizations that coordinate their efforts toward promoting quality and efficient delivery of healthcare through the use of pervasive healthcare information systems. The latter can provide seamless access to well-informed, high-quality healthcare services anywhere, anytime by removing temporal, spatial and other constraints imposed by the technological heterogeneity of existing healthcare information systems. In such environments, concerns over the privacy and security of health information arise. Hence, it is essential to provide an effective access control mechanism that meets the requirements imposed by the least privilege principle by adjusting user permissions continuously in order to adapt to the current situation. This chapter presents a pervasive grid-based healthcare information system architecture that facilitates authorized access to healthcare processes via wireless devices. Context-aware technologies are used to both automate healthcare processes and regulate access to services and data via a fine-grained access control mechanism.


2013 ◽  
Vol 385-386 ◽  
pp. 1705-1707
Author(s):  
Tzer Long Chen ◽  
Yu Fang Chung ◽  
Jian Mao Hong ◽  
Jeng Hong Jhong ◽  
Chin Sheng Chen ◽  
...  

It is important to notice that the access control mechanism has been widely applied in various areas, such as on-line video systems, wireless network, and electronic documents. We propose an access control mechanism which is constructed based on two mathematical fundamentals: Lagrange interpolation and ElGamal algorithm. We conduct performance analysis to compare the efficiency of our proposed scheme with that of several related published schemes in both key generation phase and key derivation phase. Our new scheme is proven to be more efficient. It is shown, as expected, a more efficient scheme provides relatively less security and a more secure scheme is relatively less efficient for private keys of the same size.


Sign in / Sign up

Export Citation Format

Share Document