Modelling context-aware security for electronic health records

Shetty, Pravin and Loke, Seng 2008, Modelling context-aware security for electronic health records. In Tan, Joseph (ed), Medical Informatics: Concepts, Methodologies, Tools, and Applications, IGI Global, Hershey, Pa., pp.1724-1732, doi: 10.4018/978-1-60566-050-9.ch133.

Attached Files
Name Description MIMEType Size Downloads

Title Modelling context-aware security for electronic health records
Author(s) Shetty, Pravin
Loke, SengORCID iD for Loke, Seng
Title of book Medical Informatics: Concepts, Methodologies, Tools, and Applications
Editor(s) Tan, Joseph
Publication date 2008
Chapter number 133
Total chapters 187
Start page 1724
End page 1732
Total pages 9
Publisher IGI Global
Place of Publication Hershey, Pa.
Summary The Internet has proven to be the most convenient and demanding facility for various types of businesses and transactions for the past few years. In recent years, business information systems have expanded into networks, encompassing partners, suppliers, and customers. There has been a global availability (Anderson, 2001; BSI Global, 2003) of resources over the Internet to satisfy different needs in various fields. The availability factor has called for various security challenges in fields where information is very valuable and not meant for all. Potential threats to information and system security come from a variety of sources. These threats may result in violations to confidentiality, interruptions in information integrity, and possible disruption in the delivery of services. So it is essential to manage the flow of information over the network with the required level of security. There are many security technologies and models that have been introduced which are capable of realizing the functions and objectives of information system security. This article first gives a brief overview of what we term basic security policies of an integrated security model. Then it suggests context-based security policies for a health organization scenario using contextual graphs augmented with details about specific security actions, which relate to the security policies enumerated in the integrated security model. The plan of the article is as follows. We first overview the three concepts in detail and briefly describe the concept of contextual (meta-policy) graphs. We then develop a context-based security meta-policy for securing patient records based on the security policies overviewed and discuss related work, before concluding the paper.
ISBN 1605660507
Language eng
DOI 10.4018/978-1-60566-050-9.ch133
Indigenous content off
HERDC Research category BN.1 Other book chapter, or book chapter not attributed to Deakin
Copyright notice ©2009, IGI Global
Persistent URL

Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 34 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Thu, 11 Jul 2019, 15:00:59 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact