Author : Karan Balasubramanian 1
Date of Publication :7th March 2016
Abstract: During Emergency situations in the Health care Domain, one of the main work is to manage the situation effectively the most essential requirement for handling the situation is sharing information. In this work, I present a flexible access Control Framework exploiting the complex event processing (CEP) technology which will constraint the controlled information sharing in the health care domain emergency situations. The main aim of this idea is to detect the emergencies that cannot be predicted by anomaly detection techniques, denied access request analysis and analysis of the history of permitted access requests.
Reference :
-
- LorenaCazorla, Cristina Alcaraz, and Javier Lopez. Towards automatic critical infrastructure protection through machine learning. In Eric Luiijf and Pieter Hartel, editors, Critical Information Infrastructures Security, volume 8328 of Lecture Notes in Computer Science.
- JanaBauckmann, Ulf Leser, Felix Naumann, and Veronique Tietz. Efficiently detecting inclusion dependencies. In In Int. Conf. on Data Engineering (ICDE 07). Poster, 2007.
- Alexandra Rostin, Oliver Albrecht, Jana Bauckmannr. A machine learning approach to foreign key discovery
- Eamonn Keogh, Jessica Lin, and Ada Fu. Hot sax: Efficiently finding the most unusual time series subsequence. USA, 2005.IEEE Computer Society
- M. S. Beigi, S.-F.Chang, S. Ebadollahi, and D. C. Verma. Anomaly detection in information streams without prior domain knowledge. IBM J. Res. Dev., 55(5):550– 560, September 2011.
- Ma’ayanGafny, AsafShabtai, LiorRokach, and Yuval Elovici. Detecting data misuse by applying context-based data linkageThreats ’10, pages 3–12, New York, NY, USA, 2010.
- M. A. C. Dekker and S. Etalle.Audit-based access control for electronic health records.Electron. Notes Theor. Comput. Sci., 168:221–236, February 2007.
- Nabil R. Adam, Vijay Atluri, Soon Ae Chun,. Secure information sharing and analysis for effective emergency management. dg.o ’08, pages 407–408, 2008
- Claudio A. Ardagna, Sabrina De Capitani Di Vimer. Access control for smarter healthcare using policy spaces.Comput.Secur., 29(8):848–858, November 2010
- A Ferreira, R Cruz-Correia, ,”. How to break access control in a controlled manner.” Washington, DC, USA, 2006. IEEE Computer Society