Towards a Zero Trust Based Hybrid Access Control Model for Medical Data

Colin Wilcox, Kristopher Welsh, Soufiene Djahel, Nicholas Costen, Vasileios Giagos

Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

12 Downloads (Pure)

Abstract

This paper addresses some of the limitations of current hybrid access control models, in particular the issues surrounding managed rights inheritance, a model’s consistency and its ability to reflect changes in environment without losing integrity or flexibility. Our approach describes a layered model design which allows more or less detail to be added, in real-time, to reflect changes in the real world. The model provides time-based inherited access control following the principles of zero trust to minimise risk whilst preserving its integrity and flexibility. This paper concludes by providing a comparison of how our approach differs from traditional techniques and the areas in which improvements can be seen.
Original languageEnglish
Title of host publication2024 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)
PublisherIEEE
Pages1-7
Number of pages7
ISBN (Electronic)979-8-3503-6792-8
ISBN (Print)979-8-3503-6793-5
DOIs
Publication statusE-pub ahead of print - 18 Dec 2024
Event2024 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM 2024): ICT-DM 2024 - Setif 1 University - Ferhat ABBAS, Setif, Algeria
Duration: 19 Nov 202421 Nov 2024
https://ict-dm2024.univ-setif.dz/

Publication series

Name
PublisherIEEE
ISSN (Print)2469-8822
ISSN (Electronic)2643-6868

Conference

Conference2024 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM 2024)
Country/TerritoryAlgeria
CitySetif
Period19/11/2421/11/24
Internet address

Bibliographical note

© 2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders.

This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it.

Keywords

  • Access control
  • Disaster management
  • Data models
  • Real-time systems
  • Zero Trust
  • Information and communication technology
  • Iterative methods

Fingerprint

Dive into the research topics of 'Towards a Zero Trust Based Hybrid Access Control Model for Medical Data'. Together they form a unique fingerprint.

Cite this