Digital key management for access control of electronic records

被引:0
|
作者
Simpson, William R [1 ]
Iaeng, Member [1 ]
Foltz, Kevin E. [2 ]
机构
[1] Institute for Defense Analyses, United States
[2] Institute for Defense Analyses, 4850 Mark Center Drive, Alexandria,VA,22311, United States
关键词
Electronic document exchange - Copyrights - Records management;
D O I
暂无
中图分类号
学科分类号
摘要
Access control of electronic records involves establishing a common set of access requirements, binding those access requirements to the electronic records, and computing whether or not the criteria are met for allowing access. An electronic record can be an e-mail, a document, a spreadsheet, or a series of sensor readings. Records that need to be controlled are stored in an encrypted file, which is decrypted when access criteria are verified. The number of controlled electronic records is rising dramatically. Current methods of key management often group and segment objects by type to reduce the number of keys and the associated management overhead. This approach compromises a large number of content files when exploits manage to extract cryptographic keys. The proposed process uses a hybrid symmetric/asymmetric keying approach that provides a unique key for each electronic record while minimizing the key management requirements. This method reduces losses to individual electronic records when keys are compromised, but with a greatly reduced key management process that leverages PKI processes. © 2016, IAENG International Journal of Computer Science.
引用
收藏
页码:411 / 426
相关论文
共 50 条
  • [11] Access Control Model for Sharing Composite Electronic Health Records
    Jin, Jing
    Ahn, Gail-Joon
    Covington, Michael J.
    Zhang, Xinwen
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2009, 10 : 340 - +
  • [12] Key management for content access control in a hierarchy
    Hassen, H. Ragab
    Bouabdallah, A.
    Bettahar, H.
    Challal, Y.
    COMPUTER NETWORKS, 2007, 51 (11) : 3197 - 3219
  • [13] Access control and key management for mobile agents
    Roth, V
    Jalali-Sohi, M
    COMPUTERS & GRAPHICS, 1998, 22 (04) : 457 - 461
  • [14] Access control and key management for mobile agents
    Roth, Volker
    Jalali-Sohi, Mehrdad
    Computers and Graphics (Pergamon), 1998, 22 (04): : 457 - 461
  • [15] Electronic administration, records management, and Spain's electronic access to public services legislation
    Bustelo, Carlota
    Garcia-Morales, Elisa
    PROFESIONAL DE LA INFORMACION, 2008, 17 (01): : 106 - 111
  • [16] The Research of Access Control in Digital Rights Management
    Luo, Yang-Xia
    Fang, Ding-Yi
    2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 196 - 200
  • [17] Permissioned blockchain network for proactive access control to electronic health records
    Psarra, Evgenia
    Apostolou, Dimitris
    Verginadis, Yiannis
    Patiniotakis, Ioannis
    Mentzas, Gregoris
    BMC MEDICAL INFORMATICS AND DECISION MAKING, 2024, 24 (01)
  • [18] Point and Counterpoint: Patient Control of Access to Data in Their Electronic Health Records
    Kelly Caine
    William M. Tierney
    Journal of General Internal Medicine, 2015, 30 : 38 - 41
  • [19] OASIS role-based access control for electronic health records
    Eyers, DM
    Bacon, J
    Moody, K
    IEE PROCEEDINGS-SOFTWARE, 2006, 153 (01): : 16 - 23
  • [20] Point and Counterpoint: Patient Control of Access to Data in Their Electronic Health Records
    Caine, Kelly
    Tierney, William M.
    JOURNAL OF GENERAL INTERNAL MEDICINE, 2015, 30 : S38 - S41