Security MediationTo Protect Healthcare InformationPrivacy in Collaborative Settings
Overview
:
Dominant approach
Simple View of Protection: Prohibit access .
Collaboration Needs:
False Assumption
Some Failure modes
Access Patterns versus Data:
Expected Problems
Securing the Gap
Overall Schematic
Security Mediator
Security Officer
Security officer screen
PPT Slide
Patient Screen
part of Patient result
Software Components
Primitives
Protecting Privacy in Medical Images
Primitives for Content Check
Roles
Rule system
Primitives get data for Rules
Participants in Setting Rules
Disallowed result
Security officer reaction
Rules implement policy
Coverage of Access Paths
A mediator is not just static software
Security Mediator Benefits
TIHI / SAW / TID Summary
Email: Gio@db.stanford.edu
Home Page: www-db.stanford.edu/people/gio.html
Download presentation source