Review Article | Open Access
Marcelo Antonio de Carvalho Junior, Paulo Bandiera-Paiva, "Health Information System Role-Based Access Control Current Security Trends and Challenges", Journal of Healthcare Engineering, vol. 2018, Article ID 6510249, 8 pages, 2018. https://doi.org/10.1155/2018/6510249
Health Information System Role-Based Access Control Current Security Trends and Challenges
Objective. This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. Method. We have selected articles related to our investigation theme “RBAC trends and limitations” in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: “Role-Based Access Control” OR “RBAC” AND “Health information System” OR “EHR” AND “Trends” OR “Challenges” OR “Security” OR “Authorization” OR “Attacks” OR “Permission Assignment” OR “Permission Relation” OR “Permission Mapping” OR “Constraint”. We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. Results. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Conclusion. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.
1. Introduction and Background
Access control is a paramount feature of any secured system. Generally speaking, it provides for subject-to-object segregation according to a security policy implementation at a given system. It can be divided in three phases in which the initial two are related to subject interaction and the third to the object: identification, authentication, and authorization.
Users who want access to a system are prompted by identification processes that may vary from simple username request to digital certificates or biometrics interaction on more robust environment. The main intention is to collect a unique ID (univocal and unambiguous ID), so actions related to that user during security audit can provide for user’s accountability. Authentication methods are used to prove the user’s identity allegation on subsequent phase. The intention here is to bind some authentication factor that only a legitimate user is supposedly able to provide something he knows, something he has, or something he is. Only then, at the third and final phases, the authorization takes place and the list of controlled objects is defined in conjunction with the permissions granted to the user. The intention at this point is to allow only actions that match/dominate user’s (subject) permissions on each and every object (system function or information).
Role-based access control (RBAC) addresses the needs for authorization control over objects and builds up adding the maintenance/administration feature of grouping users that have the same permissions/needs into roles. Users can hence be made members of a certain role according to their responsibilities or corporate position and can be later be reassigned to another role without impacting the underlying access control infrastructure [1, 2]. From an administrative point of view, this scheme allows the user to keep discretionary capability over his own objects but also permits a system administrator to dictate corporate rules (security policy) that affect the user. The ability to group people in such a way may lead also to achieving other security properties such as least privilege and separation of duties’ best practices. This access granting granularity is appealing to health information systems (HIS) environments where object restrictions may vary according with organization’ policy, professional abilities, or functions as well as by explicit information-owner consent for instance.
RBAC was formalized in 1992 and published by the US National Institute of Standards and Technology (NIST) in 2000 . It was later adopted and formally published as an American National Standards Institute (ANSI) standard in 2004 (ANSI INCITS 359-2004 American National Standard for Information Technology—role-based access control). Currently, a newest ANSI version (2012) is available but several discussions and debates are being conducted to assess its actual alignment, considering current trends and new system environments [3–5].
The RBAC model is composed of the core, hierarchical, static separation of duty relations and the dynamic separation of duty relation components and was intended to cope with single-organization security policy strategy .
Using core or flat functionality, permissions allocated to roles are bound to user sessions and the authorization decision is made by checking object mapping. This is dynamically performed for each and every protected object resource in the system. In the RBAC concept, there is no need to repeat permissions on different groups. That is because with the hierarchy property, one role can be related to another and associated constrains and permission sets. By the same token, different roles can be assigned to a single user, hence accumulating permissions for those who need a more flexible access control, considering multiple job position or high-ranked staff that needs to incorporate subordinate access capabilities. The stablished relationship chains users to his or her roles and then to his or her permissions.
In the illustration (Figure 1), medical director, cardiologists, and rheumatologists share doctor and resident permission set. Cardiologists and rheumatologists share specialists’ permission. All three have their own permission set.
The static and dynamic separation of duty components can be used to segment authority among different users to tighten even more the authorization to object in a way a restricted action cannot be performed alone by a single system user.
HIS are an example of environment that needs tight control over its functions and information. The healthcare industry uses RBAC massively on its systems leveraging these properties. The Brazilian Society of Health Informatics (SBIS—http://www.sbis.org.br/) electronic health records (EHR) certification program now checks RBAC characteristics for its systems certification program during audits as a newly added mandatory requirement. This addition is part of a periodic review and requirement updates adopted by SBIS to stay current with EHR needs and industry maturity . Version 3.3- and now 4.2-certified systems both have role capability attestation for access control, considering the different needs of health professionals at health-care provision over system. More specifically, the requirements on NGS1.04—authorization access control—attest for RBAC features.
The ability to comply with health industry needs is uncertain as RBAC may need adaption to new realities as cloud computing, grant delegation, emergency situations, multiple-tenancy environments, and other unpredicted scenarios that challenge the basic RBAC capabilities. Security trends and challenges may refer to healthcare procedural needs reflected in systems as early described, more focus on access control architecture and feature capabilities to meet those gaps, but also may refer to implementation specifics. Common Weakness Enumeration (CWE, https://cwe.mitre.org/) for software weaknesses (IDs: 774, 417, and 225) can be mapped to the general use of RBAC. Common Vulnerabilities and Exposures (CVE, https://cve.mitre.org/) has currently 37 publicly known security vulnerabilities listed related to RBAC use on different systems.
This article discusses authorization issues and RBAC security limitations on HIS based on a literature review. The content for that purpose is divided as follows: Objectives and Methods description, where research theme selection and literature review tools, methods, and rationale are described; Literature Review Classification, where we group and distinguish all found research approaches from selected articles; RBAC Current Trends and Limitations, where the authorization issues to comply to HIS needs is discussed; and Conclusions.
2. Objectives and Methods
This article objective is to highlight implementation characteristics, concerns, or limitations over RBAC use on HIS, using current literature review for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS purposes.
2.1. Literature Review Tools, Process, and Rationale
This study performs both a “systematic review” and “synthesis” of focused industry international literature review following general methodology and flow used in software engineering [7, 8] along with the applicable quality reporting guidelines defined by PRISMA . PRISMA is becoming a preferable reporting guideline strategy and is a replacement of QUOROM statement.
More specifically, in this review, we provide for time frame, theme aggregation/synthesis, and mapping of primary studies found discussing RBAC authorization issues. For backward review and interconnection with field study, the existing citations at selected articles were also assessed and can be seen here (http://iccst_link_for_supporting_files/Reference_backward_link). The results from the applied quality checklist can be seen here (http://iccst_link_for_supporting_files/Prisma). Figure 2 depicts the systematic process adopted. Quality assertion (comparisons) and risk assessment portions of the PRISMA checklist were NOT performed. This was due to the heterogeneous nature/type of included articles. As stated by Zhang et al. and also by Kitchenham and Brereton [7, 10], this proves to be difficult as authors’ methodology, exposed data, and approached analysis may be carried out in different fashions and therefore not directly comparable.
That said, and due to the fact that the risk of bias (RoB) using existing quality assertion tools (e.g., Cochrane RoB 2.0 tool and Newcastle-Ottawa Scale (NOS)) is not suitable to assess the data type of study selection in this literature review, reader should be advised that the only assumed quality control is indirectly obtained by the peer review applied on repositories used for content retrieval. As an overall overview of perceived quality indicators on studied material, we can inform that most of the evidence-based software engineering (EBSE) characteristics (level and quality) could be found on texts even though not clearly stated for quality means. These two characteristics refer to study design and conducted method as per author descriptions. The information is more clearly defined on those articles classified as security and efficiency assessments at Table 1.
Based on the intent to find security issues related to RBAC use on HIS systems, we have selected the following research question criteria (RQC) for this study: “what are the security trends and new access-control scenarios that may impact HIS authorization processes using RBAC?” This aims to respond to not only new research directions on future work but also the need to readapt SBIS’ authorization requirements on following versions. For that purpose, we have selected IEEExplore, ACM Digital Library, Medline, and Springer as research repositories for study selection on literature review. The document retrieval was based on the following text query (including abstracts when available): “Role-Based Access Control” OR “RBAC” AND “Health information System” OR “EHR” AND “Trends” OR “Challenges” OR “Security” OR “Authorization” OR “Attacks” OR “Permission Assignment” OR “Permission Relation” OR “Permission Mapping” OR “Constraint”. The first and second filters represent the main theme (RBAC), and the field/industry (HIS) we want to check for implications and the subsequent string is part of the areas of interest we want to discuss (that includes RBAC functionalities and potential security issues) including synonymous terms used. The article text portions selected were the title and abstract. This phase was conducted using the JabRef Reference Manager  that can perform the filtering and automatic duplicate finding without the actual access to the article file.
2.2. Inclusion and Exclusion Criteria
As the first inclusion criteria (IC1), we have selected responses from text query from the research repository. Then, we performed the second filter (IC2), selecting English-written articles only. At the following phase, we wanted to make sure that the papers were related to the HIS access control authorization phase only and the main discussion was RBAC security trends and challenges according to RQC. To achieve that, these exclusion criteria (EC1) were applied manually by assessing an article’s specific text portions. We checked for the introduction and conclusion sections of the found articles. This phase was performed by downloading the selected documents using Coordination of Personnel Development and High-level Graduation Foundation- (CAPES-) free access proxy platform.
We then classified the independently agreed selection into findings based on theme focus and type of conclusions for later discussion.
3. Literature Review Classification
A wide range of results can be found when searching for RBAC access control on HIS. More than 13,000 documents are retrieved by the search “Role-Based Access Control” AND “Health information System” on Google. The reason behind that is that RBAC is really popular and widely used within HIS scope. In two recent literature reviews aiming for a wider health informatics scope, Señor et al.  published that the most preferred access control is the RBAC. This first publication was made after assessing 21 articles out of 1208 initially selected while searching for access control management in EHR. In the following year, their next publication accounted for 27 articles out of 49 while searching for security and privacy in EHR when reporting the use of RBAC as authorization method . For our specific intentions, though, the query string used not only includes EHR, which is a subset of HIS, but also specifies the RBAC authorization features or our main concern terms for discussion (“Trends,” “Challenges,” “Security,” “Authorization,” and “Attacks”). By selecting articles using our inclusion criteria (IC1 and IC2), we found 167 documents at the 4 repositories.
20 articles resulted after manual assessment considering exclusion criteria (EC1). As seen in Table 1, 2 main types/themes were found in this review for the selected scope. The RBAC novels or adaptation classifications refer to the use of external tools to complement missing or unsecure features of RBAC or to a new implementation scenario (novel) proposition. The rationale and motivation for most of this type of classification articles was to cope today’s daily healthcare special needs, not originally mapped by traditional RBAC use.
The RBAC security and efficiency assessment type/theme grouped articles that intended to check or assess the RBAC capabilities against a certain condition or to perform comparisons. This includes model observation, case study, flaw detection, and policy-driven compliances for HIS usage or even simply listing the lack of security features needed.
Most of the documents came from IEEExplore and ACM Digital Library. Three article duplicates were removed, and two were scoped out due to language boundaries. As seen in Figure 3, the study period for type/theme is different. They started by performing security assessment mostly and then to propose new approaches and novel implementations to complement RBAC features.
3.1. RBAC Novels or Adaptations
Some papers addressed the need for emergency access and/or access delegation features in addition to RBAC. The Khan and Sakamura [14, 16, 17] work describes an RBAC adaptation based on access context. The scenario described is emergency access needed for EHR system information that is currently common on ambulatory but mostly at hospital facilities. The novel proposal accounts for emergency properties to be added to object permission details via a context-policy database addition to the circuit. A delegation token takes this into account to grant access to EHR-protected information under these circumstances. In their second and third work, this token phase is more stressed, advocating the use of eTRON chips (eTRON chips are SIM or USB hardware-type equipped with encryption functionalities) for mutual authentication.
Also, focused on emergency access to protected EHR information over wireless sensor networks (WSN) that implement RBAC, Maw et al.  proposed a “breaking the glass” feature allowing access to a previously blocked object under certain user circumstances and obligations.
The delegation and emergency access discussed by these authors are mapped by version 3.3 and 4.2 versions of SBIS’ certification requirement set (NGS1.04.07) but are still conditional and a nonmandatory feature.
Other authors included access segmentation or object-detailed representation to propose a granular view for improved authorization decision or interdomain access over RBAC. Liu et al.  proposed a novel based on RBAC to be used at nontrusted EHR storage environment (i.e., cloud computing public offers). In this proposition, a trusted key entity is added to the components so hierarchical identity-based encryption can be implement and the EHR consistency status can be audited externally. At the following year, Zhou et al.  also proposed an encryption-based solution to achieve hierarchical identity-based broadcast encryption on RBAC and bind the EHR access policy as access key. Using a similar approach but not advising a single key distribution, Warren and Chi  proposed ciphertext policy multiauthority (CPMA) and associated use of RBAC permissions to either allow access considering roles (spatial capability) and time (temporal capability) over encrypted EHR on cloud environments. Zhang et al.  had previously formalized this spatial time approach as RBTBAC model.
The Chen and Hoang  approach is also concerned with the interdomain and cross-border issues related to the use of cloud-based solutions. Similar to [14, 17], they propose a context-based access decision that adds the “Role Roaming” and the “Active Auditing” to the scheme. Also using an information segmentation approach to store EHR securely in the cloud environment, Premarathne et al.  suggest the use of steganography-cryptography to index protected information. Also exploring context-based adaptions built upon RBAC, Bhatti et al.  proposed encoding disclosure and privacy rules by using a declarative predicate-based syntax in the policy that is XML-based language they call X-GTRBAC. That proposal also supports interdomain collaboration via federation arrangements and specific policies.
Amato et al.  propose a semantic-based RBAC system for a more granular access decision using ontologies to represent healthcare access needs, allowing access to sections of EHR information accordingly. It uses Web Ontology Language (OWL) for proposed ontology representation. Similarly, De la Rosa Algarin et al.  proposed a role-slice representation thru XML (role-slice diagram) for more granular queries.
Using Security Assertion Markup Language (SAML), Mchumo and Chi  perform a simple case-study to demonstrate interdomain use of RBAC considering this adaptation. Alhaqbani and Fidge  stated that interdomain/federation using RBAC alone is not feasible and a combination adding mandatory access control (MAC) and discretionary access control (DAC) is needed.
Basant and Kumar  demonstrated a possible bottom-up EHR access control method applied to element and atomic data (database tuples) that is based on information feature vector and access classification algorithm (AC2) to be used in conjunction with RBAC.
A few authors proposed additional security layers to RBAC implementation addressing integrity or confidentiality needs on HIS.
Privacy requirements on top of RBAC implementation were proposed by Liu et al.  via the open and trusted health information systems (OTHIS) using a user-centric approach to build up authorization over database table and row level. This approach indirectly reflects a new SBIS requirement mapped in the 4.2 newest publishing. The requirement NGS1.12.02 is still recommended only but clearly states the need for patient discretion over its information access.
3.2. RBAC Security and Efficiency Assessments
Lee et al.  perform RBAC abnormality analysis using principal component analysis (PCA) method for collecting EHR access traffic over the network. Using intrusion detection system (IDS) and similar techniques, they suggest that the misuse detection over the network can be performed by comparing packages that require RBAC authority validity differently placed in a x- and y-axis when compared to a forged/attack packages.
Helms and Williams  assess four different EHR RBAC-aware systems for implementation evaluation. From the 25 criteria selected, 8 were directly related to RBAC security. The study shows that all four systems failed to implement an RBAC component of separation of duties. Two of them did not use the best practice “permission-role review” from symmetric component.
Beimel and Peleg  conducted a controlled experiment comparing authorization policies in different scenarios. The contextual role-based access control (context) model and the situation-based access control (SitBAC) model (introduced by the same author in 2008) resulted equally match when simple queries and basic access cases were reproduced. SitBAC though was more efficient while treating complex access decisions involving different roles and contexts altogether.
4. RBAC Current Security Trends and Limitations Mapped on HIS
Considering the different healthcare system scenarios and limitations described by the distinguish approaches and per classification applied in this paper, it is possible to correlate different security trends to be addressed on RBAC-aware HIS. Most of the found articles advocate RBAC adaptations. That is an indication that either role-based access control is a long-lived HIS access control selection or that a feasible replacement is not available at the moment. Yet, several improvements on existing RBAC system is advised to cope with diverse current HIS implementations and use scenarios. Although some articles focused only at describing the need of an additional security layer or different access control model combination [26, 29, 31], we can summarize RBAC current adaptation needs as follows: (i)Conditional or emergency access and authorization are delegated.(ii)Context- and situation access-based solutions are advocated to be adapted over original RBAC features [14, 16–18, 32] requiring additional user’s obligation.(iii)Access segmentation and interdomain/federation scenarios are needed.(iv)Record-dependent or attribute-based encryption using single or multiple trust supplier [15, 21, 24, 33] is suggested. Fine granular authorization for better security policy representation either using semantic-, time-, or spatial-based approaches is advised [20, 25, 27]. Different languages for role and authorization mapping could be used [19, 22, 23, 28].
4.1. Next Steps and Future Work
As we experience applying inclusion criteria at the studies’ selection phase, the focus on HIS-related papers removed several articles that discuss RBAC security trends and challenges but in a wider approach or implemented in another industry or usage segment. In fact, when we remove the HIS and EHR from our query, it is possible to notice 309% average increase over our preliminary results from the same repositories. By reading the first articles from this broader query, we can infer that this theme is recurrent in other industries, and therefore, it is reasonable to assume that security issues that also impact HIS are being discussed by other field’s researchers and therefore must be incorporated for a more in-depth RBAC assessment on future work.
50 authors are responsible for the published researches that matched this field of interest. Contributions are related to 10 different countries. Less than one-fourth of the RBAC studies related to our criteria were HIS or EHR related, which indicates most of the researches are focused on other industry or non-industry-related works. As per the publishing dates of found articles, we can see that the topic is relatively recently explored by researchers. 17 articles that advocate RBAC adaptations mostly focus on the following: emergency access, authorization delegation, and interdomain topics. Despite many RBAC limitations and tradeoffs, judging by the number of articles suggesting RBAC adaptations, there is currently no author suggesting full replacement of RBAC for HIS environment. There is no clear indication of RBAC obsolescence for HIS use.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
The authors thank CAPES and its partnership with Sao Paulo Federal University (Unifesp) sponsorship for the repository free access.
- D. F. Ferraiolo, J. A. Cugini, and D. R. Kuhn, “Role-based access control: features and motivations,” in 11th Annual Computer Security Applications Conference, pp. 241–248, New Orleans, LA, USA, 1995.
- R. Sandhu, D. F. Ferraiolo, and D. R. Kuhn, “The NIST model for role based access control: toward a unified standard,” in RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control, pp. 47–63, Berlin, Germany, July 26–28, 2000.
- E. J. Coyne and T. R. Weil, “ABAC and RBAC: scalable, flexible, and auditable access management,” IT Professional, vol. 15, no. 3, pp. 14–16, 2013.
- D. R. Kuhn, “Vulnerability hierarchies in access control configurations,” in 2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), Arlington, VA, USA, Oct. 31, 2011.
- “INCITS 359-2012 Information Technology-Role Based Access Control. ANSI 2012,” http://webstore.ansi.org/.
- M. A. J. Carvalho, I. T. Pisa, and C. L. F. Ortolani, “Health information system (HIS) security standards and guidelines history and content analysis,” Journal of Health Informations, vol. 8, no. 3, pp. 95–102, 2016.
- H. Zhang, M. A. Babar, and B. M. Ali, “Systematic reviews in software engineering: an empirical investigation,” Information and Software Technology, vol. 55, no. 7, pp. 1341–1354, 2013.
- B. Kitchenham and P. Brereton, “A systematic review of systematic review process research in software engineering,” Information and Software Technology, vol. 55, no. 12, pp. 2049–2075, 2013.
- A. Liberati, D. G. Altman, J. Tetzlaff et al., “The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration,” Journal of Clinical Epidemiology, vol. 62, no. 10, pp. e1–e34, 2009.
- B. Kitchenham and S. Charters, “Guidelines for performing systematic literature reviews in software engineering version 2.3,” Engineering, vol. 45, no. 4ve, article 1051, 2007.
- Team TJ, “JabRef reference manager version 3.6,” 2016, http://jabref.sourceforge.net/.
- I. C. Señor, J. L. Fernández--Alemán, P. Á. Lozoya, and A. Toval, “Access control management in electronic health records: a systematic literature review,” Gaceta Sanitaria, vol. 26, no. 5, pp. 463–468, 2012.
- J. L. Fernández-Alemán, I. C. Señor, P. Á. Lozoya, and A. Toval, “Security and privacy in electronic health records: a systematic literature review,” Journal of Biomedical Informatics, vol. 46, no. 3, pp. 541–562, 2013.
- M. F. F. Khan and K. Sakamura, “A secure and flexible e-health access control system with provisions for emergency access overrides and delegation of access privileges,” in 2016 18th International Conference on Advanced Communication Technology (ICACT), pp. 541–546, Pyeongchang, South Korea, 2016.
- W. Liu, X. Liu, J. Liu, Q. Wu, J. Zhang, and Y. Li, “Auditing and revocation enabled role-based access control over outsourced private EHRs,” in 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, pp. 336–341, New York, NY, USA, 2015.
- M. F. F. Khan and K. Sakamura, “Fine-grained access control to medical records in digital healthcare enterprises,” in 2015 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6, Hammamet, Tunisia, 2015.
- M. F. F. Khan and K. Sakamura, “Context-aware access control for clinical information systems,” in 2012 International Conference on Innovations in Information Technology (IIT), pp. 123–128, Abu Dhabi, UAE, 2012.
- H. A. Maw, H. Xiao, B. Christianson, and J. A. Malcolm, “An evaluation of break-the-glass access control model for medical aata in wireless sensor networks,” in 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 130–135, Natal, Brazil, 2014.
- F. Amato, N. Mazzocca, G. Pietro, and M. Esposito, “A system for semantic-based access control,” in 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 451–455, Compiegne, France, 2013.
- L. Chen and D. B. Hoang, “Novel data protection model in healthcare cloud,” in 2011 IEEE International Conference on High Performance Computing and Communications, pp. 550–555, Banff, AB, Canada, 2011.
- U. Premarathne, A. Abuadbba, A. Alabdulatif et al., “Hybrid cryptographic access control for cloud-based EHR systems,” IEEE Cloud Computing, vol. 3, no. 4, pp. 58–64, 2016.
- A. A. De la Rosa, S. A. Demurjian, S. Berhe, and J. A. Pavlich-mariscal, “A security framework for XML schemas and documents for healthcare,” in 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops, pp. 782–789, Philadelphia, PA, USA, 2012.
- S. Mchumo and H. Chi, “A framework for access control model in enterprise healthcare via SAML,” in ACM SE '10 Proceedings of the 48th Annual Southeast Regional Conference, Oxford, Mississippi, 2010.
- X. Zhou, W. Liu, J. Liu, and Q. Wu, “Anonymous role-based access control on E-health records,” in ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 559–570, Xi'an, China, 2016.
- R. Zhang, J. Liu, and Z. Han, “RBTBAC: secure access and management of EHR data,” in International Conference on Information Society (i-Society 2011), pp. 494–499, London, UK, 2011.
- V. Liu, W. Caelli, L. May, and T. Sahama, “Privacy and security in open and trusted health information systems,” in HIKM ’09 Proceedings of the Third Australasian Workshop on Health Informatics and Knowledge Management - Volume 97, pp. 25–30, Wellington, New Zealand, 2009.
- T. Basant and A. Kumar, “Role-based access control through on-demand classification of electronic health record,” International Journal of Electronic Healthcare, vol. 8, no. 1, pp. 9–24, 2015.
- R. Bhatti, A. Samuel, S. Member, and M. Y. Eltabakh, “Engineering a policy-based system for federated healthcare databases,” IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 9, pp. 1288–1304, 2007.
- B. Alhaqbani and C. Fidge, “Access control requirements for processing electronic health records,” in Business Process Management Workshops. BPM 2007, A. Hofstede, B. Benatallah, and H. Y. Paik, Eds., pp. 371–382, Springer, Berlin, Heidelberg, 2008.
- D. Lee, B. H. Kim, and K. J. Kim, “Detecting method on illegal use using PCA under HER environment,” in 2010 International Conference on Information Science and Applications, pp. 1–6, Seoul, South Korea, 2010.
- E. Helms and L. Williams, “Evaluating access control of open source electronic health record systems,” in SEHC ’11 Proceedings of the 3rd Workshop on Software Engineering in Health Care, pp. 63–70, Waikiki, Honolulu, HI, USA, 2011.
- D. Beimel and M. Peleg, “Comparing the context and the SitBAC models for privacy preservation in terms of model understanding and synthesis,” AMIA Annual Symposium Proceedings, vol. 29, no. 2, p. 2001, 2008.
- L. Warren and H. Chi, “Securing EHRs via CPMA attribute-based encryption on cloud systems,” in ACM SE '14 Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, Georgia, 2014.
Copyright © 2018 Marcelo Antonio de Carvalho Junior and Paulo Bandiera-Paiva. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.