A semantic authorization model for pervasive healthcare

被引:7
|
作者
Li, Zang [1 ]
Chu, Chao-Hsien [1 ,2 ]
Yao, Wen [1 ]
机构
[1] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16802 USA
[2] Singapore Management Univ, Sch Informat Syst, Singapore 179802, Singapore
关键词
Semantic access control; Authorization; RFID; Ontology; Pervasive healthcare; ACCESS-CONTROL;
D O I
10.1016/j.jnca.2013.06.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate how to secure sharing of complex data objects among pervasive information systems. To address the challenges posed by heterogeneous data sources, complex objects and context dynamics, we propose an advanced authorization model that supports specifying and enforcing authorizations in flexible and efficient ways. The model employs ontology and semantic web technologies to conceptualize data and explicitly express the relationships among concepts and instances involved in information sharing. Authorizations can be specified at different levels of the predefined concept hierarchies and be propagated to lower-levels. A novel decision propagation model is proposed to enable fast evaluation and updating of concept-level access decisions. To resolve conflicts among policies, we model a policy set as a semilattice, upon which a binary operation is defined to adapt to various requirements. Moreover, enabled by ontology reasoning tools, a flexible specification approach of authorization, namely rule-based policy generation, is developed to encode context dynamics, making the authorization enforcement adaptive to contexts. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:76 / 87
页数:12
相关论文
共 50 条
  • [1] Trust-based dynamic authorization model for pervasive computing
    Guo, Yajun
    Wang, Liang
    Hong, Fan
    Han, Lansheng
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2007, 35 (08): : 70 - 73
  • [2] Pervasive Healthcare Paving the Way for a Pervasive, User-centered and Preventive Healthcare Model
    Arnrich, B.
    Mayora, O.
    Bardram, J.
    Troester, G.
    METHODS OF INFORMATION IN MEDICINE, 2010, 49 (01) : 67 - 73
  • [3] Pervasive authentication domains for automatic pervasive device authorization
    Sailer, R
    Giles, JR
    SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 144 - 148
  • [4] The Secure Authorization Model for Healthcare Information System
    Wen-Shin Hsu
    Jiann-I Pan
    Journal of Medical Systems, 2013, 37
  • [5] The Secure Authorization Model for Healthcare Information System
    Hsu, Wen-Shin
    Pan, Jiann-I
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)
  • [6] A MODEL OF AUTHORIZATION FOR OBJECT-ORIENTED AND SEMANTIC DATABASES
    RABITTI, F
    WOELK, D
    KIM, W
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 303 : 231 - 250
  • [7] Behavioral Reference Model for Pervasive Healthcare Systems
    Tahmasbi, Arezoo
    Adabi, Sahar
    Rezaee, Ali
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (12)
  • [8] A Hybrid Context Model for Pervasive Healthcare System
    Ma, Shouming
    Wang, Ruchuan
    Ye, Ning
    ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 531 - +
  • [9] Behavioral Reference Model for Pervasive Healthcare Systems
    Arezoo Tahmasbi
    Sahar Adabi
    Ali Rezaee
    Journal of Medical Systems, 2016, 40
  • [10] Authorization Model for IoT Healthcare Systems: Case Study
    Tawalbeh, Mais
    Quwaider, Muhannad
    Tawalbeh, Lo'ai A.
    2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2020, : 337 - 342