Preview

Dr. Jones Orthopedics: Role-Based Access Control (RBAC)

Powerful Essays
Open Document
Open Document
1321 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Dr. Jones Orthopedics: Role-Based Access Control (RBAC)
Role Based Access Control (RBAC) has been widely implemented since the 1970s. It has been implemented and favored, even to this day for smaller organizations where business rules do not need the granular access control to its assets. RBAC is used on the provisioning process – administration time to provide access to a user by assigning a role. It also allows for hierarchical roles (e.g. nurse_supervisors and nurse_staff) – along with this hierarchy, specific duties are separated per role (e.g. nurse_supervisors can approve timesheets, nurse_staff can only enter or view timesheets).
But the increasing business requirements, explosion of new technologies, the onset of mobile devices and the need to secure assets from malicious intents – the
…show more content…
Nurse_radiology has access to all radiology patients, including Patient A.

Nurse at Dr. Jones Orthopedics needs to have a view only access Dr. Jones patient’s data only – this will include patient A. (Nurse at Dr. Jones Orthopedics is nurse_orthopedics Role2). Nurse_orthopedics can only access patients of Dr. Jones Orthopedics – and should not have access to other patient’s medical data on the EHR system.

Assuming Mary the Nurse works for both the Radiology Department and at Dr. Jones Orthopedics – it means that with RBAC – Mary needs to be assigned two different user log-ins to be able to view the same set of patient’s data (this case Patient A).

With the implementation of ABAC – Mary can be assigned with a single user log -in. And based on the following Attributes: Department (Radiology), Office Location (Dr. Jones Orthopedics), Authority Level (view) of Patient’s Data – a user authentication policy is examined to allow/grant access to the data. So, when Mary the nurse logs-in to the EHR system, she will be able to view Patient’s A data from the Radiology Department while she is logged on at Dr. Jones Orthopedics located on a separate building or even on another
…show more content…
Conclusions

RBAC is widely implemented across different systems. The shortcomings of RBAC is addressed when the access control management is supplemented with ABAC method.

RBAC and ABAC advantage
ABAC will be a great addition to the RBAC implementation. RBAC Roles can be considered as one of the attributes for ABAC. This will allow for a system with the RBAC advantage of defining roles and the policy based authorization with the introduction of ABAC. Policy based authorization is attribute driven and can provide real time authorization management.

Matters for Consideration

Cost is one of the reasons why companies are not implementing nor adapting ABAC to the already stable legacy systems.
Development and Maintenance Cost
Audit controls must be in place for the harmonized RBAC-ABAC

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Study Guide

    • 508 Words
    • 3 Pages

    Role-based access control (RBAC) is an access policy determined by the system, not the owner. RBAC is used in commercial applications and also in military systems, where multi-level security requirements may also exist. RBAC differs from DAC in that DAC allows users to control access to their resources, while in RBAC, access is controlled at the system level, outside of the user's control. Although RBAC is non-discretionary, it can be distinguished from MAC primarily in the way permissions are handled. MAC controls read and write permissions based on a user's clearance level and additional labels. RBAC controls collections of permissions that may include complex operations such as an e-commerce transaction, or may be as simple as read or write. A role in RBAC can be viewed as a set of…

    • 508 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Privileged Users will be presented the ROB for Users with Privileged Access to Information Systems. Non-Privileged Users are required to select the appropriate ROB at first login per database prior to receiving access to the application. If a user elects to decline the ROB, access to…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    • The effect that temperature, pH, time, enzyme concentration, and substrate concentration has on Enzyme Catalysis.…

    • 1132 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    Is the process of determining if an authenticated user has access to the resources they requested. Is finding out if the person, once identified is permitted to manipulate specific resources. This is usually determined by finding out if that person is of a particular role that has access to the resources. Authorization is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Wk8 Quiz Hca

    • 379 Words
    • 2 Pages

    Patients records will be able to go from one doctor to another, all information will be accessible; lab results, radiology, personal, and symptoms…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Dbm 381 Week 1 Individual

    • 971 Words
    • 4 Pages

    The first type of database that a health care facility may use is Operational database. This database consists of data on patients, the doctors’ orders for care, pharmacy orders, tests ordered, and results of these tests. This database can include product information from vendors. Storing a patient’s electronic health record (EHR) can happen in different types of databases and these databases could have different types of formatting styles. Each of the database software has to have security protocols in place to safeguard the patient’s privacy, yet allow access to the data by different health care providers.…

    • 971 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Administrators at the University of Colorado found a way to comply HIPAA to protect the integrity of electronic patient records. In addition to meeting the Privacy requirement of HIPAA, they needed a system to deal with their staff of medical professionals who move from computer to computer throughout their shifts. To be better equipped to achieve compliance, the hospital chose to use technology via a…

    • 783 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Est1 Task 1

    • 623 Words
    • 3 Pages

    It also allows physicians and authorizes medical staff to view patient’s medical record. But password and security codes are given to certain medical staff to protect the privacy of individuals. Furthermore, scalability grants permission to the organizations to conclude on security measures appropriate to its operational risks.…

    • 623 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab notes

    • 251 Words
    • 2 Pages

    User-based and groups or role-based controls are two types of access controls for Windows Server 2003 for folders and authentication.…

    • 251 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Provides a basic level of interoperability among electronic health records (EHRs) maintained by individual physicians and organizations.…

    • 2463 Words
    • 10 Pages
    Better Essays
  • Good Essays

    EHR is a new and improve digital version of a patient’s physical paper chart. EHRs is a patient-centered system that makes information available via the computer system, and most of all, it is secure, safe and can only be used by authorized users. Even though EHR involves medical treatment and patient medical history, the system is created to go beyond normal or basic clinical data collection in hospitals, private doctors and other healthcare facilities across the nation. As a Consultant, I will have to come up with a strategy planning process, which will make everything fall into place. When it comes to setting up a hospital or updating old technologies within a hospital setting, the administration work in conjunction with the staff such as the doctors and nurses and also alongside the CEO Mr. Johnson, who is the new executive who brought in recently in the Tewsbury hospital.…

    • 682 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Beef Graft Case

    • 916 Words
    • 4 Pages

    The beginning of Beef Graft Case opened to public is when there was a caught of Ahmad Fathonah by Komisi Pemberantasan Korupsi (KPK). Fathonah was caught with cash in amount of Rp 100.000.000,00 thas was sealed in a plastic bag and some documents. Fathonah was caught by KPK based on information that said there was a bribe transaction about beef import in the PT Indoguna Utama office. Based on that information, KPK caught Ahmad Fathonah that has accepted money (bribe) from Juard Effendi and Arya Abdi Effendi, the directors of PT Indoguna Utama. After some investigation, KPK made a statement that Luthfi Hasan Ishaq, The President of Partai Keadilan Sejahtera (PKS) was with Ahmad Fathonah as recipients of the bribe from PT Indoguna Utama. KPK found four suspects of this case; Ahmad Fathonah, Luthfi Hasan Ishaq (LHI), Juard Effendi, and Arya Abdi Effendi.…

    • 916 Words
    • 4 Pages
    Satisfactory Essays

Related Topics