Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > How to break access control in a controlled manner
Publication

Publications

How to break access control in a controlled manner

Title
How to break access control in a controlled manner
Type
Article in International Conference Proceedings Book
Year
2006
Authors
ferreira, a
(Author)
FMUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
cruz-correia, r
(Author)
FMUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
farinha, p
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
oliveira-palhares, e
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
chadwick, dw
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Conference proceedings International
Pages: 847-851
19th IEEE Symposium on Computer-Based Medical Systems
Salt Lake City, UT, JUN 22-23, 2006
Scientific classification
FOS: Natural sciences > Computer and information sciences
Other information
Authenticus ID: P-004-QYN
Abstract (EN): The Electronic Medical Record (EMR) integrates heterogeneous information within a Healthcare Institution stressing the need for security and access control. The Biostatistics and Medical Informatics Department from Porto Faculty of Medicine has recently implemented a Virtual EMR (VEMR) in order to integrate patient information and clinical reports within a university hospital. With more than 500 medical doctors using the system on a daily basis, an access control policy and model were implemented. However, the healthcare environment has unanticipated situations (i.e. emergency situations) where access to information is essential. Most traditional policies do not allow for overriding. A policy that allows for "Break-The-Glass (BTG)" was implemented in order to override access control whilst providing for non-repudiation mechanisms for its usage. The policy was easily integrated within the model confirming its modularity and the fact that user intervention in defining security procedures is crucial to its successful implementation and use.
Language: English
Type (Professor's evaluation): Scientific
Contact: amlaf@med.up.pt
No. of pages: 5
Documents
We could not find any documents associated to the publication.
Recommend this page Top
Copyright 1996-2025 © Faculdade de Direito da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-08-07 at 10:34:56 | Privacy Policy | Personal Data Protection Policy | Whistleblowing