Abstract
Recently research is focused on security policy integration and conflict reconciliation among various healthcare organizations. Problem statement: However, challenging security and privacy risk issues still arisen during sharing sensitive patient data in different large distributed organizations. Though eXtensible Access Control Markup Language (XACML) has a powerful capacity of expression, it does not support all the elements character of RBAC. Thus, it has not been built to manage security in large distributed systems in healthcare domain since each organization may join or leave at runtime. The policy redundancy and conflict resolution are important to resolve redundancy and inconsistencies before security policies can be integrated for healthcare collaboration. Existing approaches did not look at policy redundancy and conflict resolution process based on the types of redundancy and conflict for dynamic set of organizations collaboration. Besides that, a policy integration mechanism in order to generate actual security policy integration is not in well studied. Approach: In this study, we proposed an approach for integrating security XACML policies based on RBAC policy model considering both constraints and meta data information. Besides that, an approach to filter and collect only the required policies from different organizations based on user’s integration requirements is investigated. It is important for us to resolve policy redundancy and conflicts based on the types of policy redundancy and conflicts. Results: From the observation and literature analysis, it can be concluded that our work could provide the maximum confidence for pre-compile a large amount of policies and only return the most similar policies for policy integration. Besides that, our approach proved that the more restrict policy will be generated during the policy integration. Conclusion: Our work can guarantee the completeness as well as consistency of the access control policy. It is recommended that the dynamic constraints such as dynamic Separation Of Duty (SOD) should be considered because we believe this consideration can support dynamic updates and control policies in collaborative environments.
Highlights
Nowadays there are increasing needs for sharing data that contain personal information between different organizations such as federal, state and local government, commercial health insurance company and self-pay patient (Frezza and Chiriva-Internati, 2005)
We proposed an approach for integrating security XACML policies based on Role-Based Access Control (RBAC) policy model considering both constraints and meta data information
Our work will resolve policy redundancies and conflicts based on the types of policy redundancy and conflicts
Summary
Nowadays there are increasing needs for sharing data that contain personal information between different organizations such as federal, state and local government, commercial health insurance company and self-pay patient (Frezza and Chiriva-Internati, 2005). We proposed an approach for integrating security XACML policies based on RBAC policy model considering both constraints and meta data information. The policy checking algorithm is studied in a wide variety of environments ranging from small to large integration issues These studies only focus on organization, with a few to a large number of roles and policy consistency comparison and evaluation rather comprising of complex access control constraints. Based on the above previous study, none of the approaches focus on the issues of integrating security policies based on RBAC policy model considering both dynamic constraints and meta data information. Our study discussed RBAC issues under collaborative context, role hierarchy, separation of duty and cardinality constraints and meta data information in collaboration environment to further guarantee the consistency policy integration will operate smoothly in multi-domain environment.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: American Journal of Economics and Business Administration
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.