Skip to main content

A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2200))

Abstract

Most of the work on multimedia medical images security until now has focused on cryptographic approaches. While valuable, cryptography is not enough to control access to images. Therefore additional protection approaches should be applied at a higher level. Role-based access control (RBAC) is a good candidate to provide access control in a multimedia medical image DBMS. However, in a multimedia medical image DBMS, specifications of image access rights are often based on the semantic content of the images, the attributes of the user accessing the image, the relationship between the user and the patient whose images are to be accessed and the time. Unfortunately, RBAC cannot be used to handle the above requirements. In this paper we describe an extended RBAC model by using constraints in the specification of the Role-Permission relationship. The proposed access control model preserves the advantages of scaleable security administration that RBAC-style models offer and yet offers the flexibility to specify very fine-grained, flexible, content, context and time-based access control policies.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. P. Smith, “Authentication of Digital Medical Images with Digital Signature Technology”, Radiology 1995, 194, pp:771–774.

    Google Scholar 

  2. S. T. C. Wong“A Cryptologic-Based Trust Center for Authenticating Medical Images,” J. American Medical Informatics Assoc., Vol. 3, No. 6, Nov./Dec. 1996, pp. 410–421.

    Google Scholar 

  3. R. B. Wolfang and E. J. Delp, “Overview of image security techniques with applications in multimedia systems”, SPIE Conference on Multimedia Networks: Security, Displays, Terminals and Gateways, Vol. 3228, November 2–5, 1997, Dallas, Texas, pp:297–3308.

    Google Scholar 

  4. E. B. Fernandez and K. R. Nair, ”An Abstract Authorization System for the Internet”, in Proceedings of the 9th International Workshop on Database and Expert Systems Applications, 1998.

    Google Scholar 

  5. R. Sandhu, E. J. Coynee, H. L. Feinsteinn, and C. E. Youman, “Role-based access control models”, IEEE Computer, 29(2), February, 1996.

    Google Scholar 

  6. R. K. Thomas, “Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments”, ACM RBAC’97, 1997.

    Google Scholar 

  7. Rational Software Corporation, Object Constraint Language Specification, Version 1.1, Available at http://www.rational.com/uml/ , September 1997.

  8. A. Tchounikine, “Creation and content-based retrieval in a radiological documentary record”, in Proceedings of the 3rd Basque International Workshop on Information Technology, 1997.

    Google Scholar 

  9. L. Giuri and P. Iglio, “Role templates for content-based access control”, in Proceedings of the Second ACM Role-Based Access Control Workshop, November 1997.

    Google Scholar 

  10. E. C. Lupu and M. Sloman, “Reconciling role-based management and role-based access control”, in Proceedings of the Second ACM Role-Based Access Control Workshop, November 1997.

    Google Scholar 

  11. S. T. C. Wong and H. K. Huang, “Design methods and architectural issues of integrated medical image data based systems”, Computerized Medical Imaging and Graphics, Vol. 20, No 4, pp. 285–299, 1996.

    Article  Google Scholar 

  12. E. A. Stamatakis, M. F. Glabus, D. J. Wyper, A. Barnes and J. T. L. Wilson, “Validation of Statistical Parametric Mapping (SPM) in Assessing Cerebral Lesions: A Simulation Study”, NeuroImage 10, 397–407 (1999).

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tzelepi, S., Pangalos, G. (2001). A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems. In: Davida, G.I., Frankel, Y. (eds) Information Security. ISC 2001. Lecture Notes in Computer Science, vol 2200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45439-X_23

Download citation

  • DOI: https://doi.org/10.1007/3-540-45439-X_23

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42662-2

  • Online ISBN: 978-3-540-45439-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics