Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A system for timely and controlled information sharing in emergency situations
Carminati B., Ferrari E., Guglielmi M. IEEE Transactions on Dependable and Secure Computing10 (3):129-142,2013.Type:Article
Date Reviewed: Sep 12 2013

An access control system should support the ability to make changes in response to emergencies. The authors of this paper propose a model for making such changes during medical emergencies, which are actually business as usual in a hospital. Such emergencies require predictable, context-dependent, temporary, and dynamic changes to authorizations.

The authors use the core event specification language to trigger the start and the end of an emergency condition. Temporary access control policies (TACPs) are activated when an emergency is detected and are parameterized with specific emergency instance data, such as the specific actors involved.

The framework must be constrained to address the possibility of overlaps between start and end emergency conditions. The proposed model calls this the simultaneous holding problem (SHP). The authors propose constraints to address the SHP and prove that they correctly handle it.

The paper describes administration policies designed to ensure that emergency managers securely introduce TACPs. New policies issued are checked against the administration policies. The possible result is not just “ok” or ”not ok,” because the proposed policy may be rewritten automatically to comply with the administration policy. The authors prove that only compliant policies will result.

The last part of the paper presents the performance results for a prototype implementation, which seem acceptable.

Predictable situations should not be treated as exceptions that are ad hoc and insecure. This paper provides a basis for a complete and better approach for such emergency situations.

Reviewer:  A. Mariën Review #: CR141542 (1311-1018)
Bookmark and Share
  Featured Reviewer  
 
Access Controls (D.4.6 ... )
 
 
Medical Information Systems (J.3 ... )
 
 
Privacy (K.4.1 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Access Controls": Date
Access control lists in capability environments
Lopriore L. Technology and Science of Informatics 3(3): 163-174, 1984. Type: Article
Mar 1 1985
Some variants of the take-grant protection model
Biskup J. (ed) Information Processing Letters 19(3): 151-156, 1984. Type: Article
Jun 1 1985
On access checking in capability-based systems
Kain R., Landwehr C. (ed) IEEE Transactions on Software Engineering SE-13(2): 202-207, 1987. Type: Article
Dec 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy