Proximity Based Access Control for Smart- Emergency Departments * Sandeep Gupta*, T. Mukherjee*, K. Venkatasubramanian* and T. Taylor + *Department of.

Slides:



Advertisements
Similar presentations
RBAC and HIPAA Security Uday O. Ali Pabrai, CHSS, SCNA Chief Executive, HIPAA Academy.
Advertisements

Assessment Photo Album
Positive Behavioral Supports for Students with ASD Module 8 Lesson 1.
Team 6 Lesson 3 Gary J Brumbelow Matt DeMonbrun Elias Lopez Rita Martin.
Acknowledgements RHH ED staff Safety and Quality Unit RHH for their participation and valuable contribution Next Steps It is envisaged over the next 12.
Emergency Department Thoracotomy: A Hybrid Simulation With A Clinical Outcome.
Access Control Methodologies
Lesson 17: Configuring Security Policies
WHY USE IT? It’s big (coverage & time) It’s interdisciplinary It’s free (to you…) It’s only a click away It does some “tricks” that nothing else can do.
1 Trust and Privacy in Authorization Bharat Bhargava Yuhui Zhong Leszek Lilien CERIAS Security Center CWSA Wireless Center Department of CS and ECE Purdue.
Networking for Wireless Sensors in the energy project Jonathan Chu Computer Science, UCI Mentor: Professor David Kirkby SURF-IT July 27, 2010.
Testing Implementations of Access Control and Authentication Graduate Students: Ammar Masood, K. Jayaram School of Electrical and Computer Engineering.
ULTRA-WIDE BAND: W hat is it? How can it be used? Presented by: Troy Hayes Kevin Koelbel Robert Stewart.
Lecture Nine Database Planning, Design, and Administration
Disaster Preparedness and Emergency Response. triage noun \trē-äzh\ a : the sorting of and allocation of treatment to patients (especially battle and.
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
Receiver Design for Ultrawideband PPM Communication Systems Vijay Ullal Clemson University July 29, SURE Program.
Presenter: Shant Mandossian EFFECTIVE TESTING OF HEALTHCARE SIMULATION SOFTWARE.
Smart Environments for Occupancy Sensing and Services Paper by Pirttikangas, Tobe, and Thepvilojanapong Presented by Alan Kelly December 7, 2011.
Sunsern, R., Ph.D* Pothong,J., MSc Rukkaumsook, S., MSc
ICT 1 Towards an Integrated Approach to Access Control to Health Information Presented by: Inger Anne Tøndel SINTEF Co-authors: Per Håkon Meland SINTEF.
What is the curriculum? ay%20three%20curriculum.ppt –A set of courses constituting an area of specialization –Work schedule.
Criticality Aware Access Control Model for Pervasive Applications Sandeep K. S. Gupta, T. Mukherjee, K. Venkatasubramanian Impact Lab (
Copyright © 2014, 2011 Pearson Education, Inc. 1 Chapter 14 Sampling Variation and Quality.
Designing Active Directory for Security
Ultra Wideband Technology Group 6 Will Culberson Ben Henley.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
Healthcare Institutions
Lecture 7 Integrity & Veracity UFCE8K-15-M: Data Management.
By M. Swapna 09J95a Contents Introduction Types of Jammer How Jammer Works What inside Jammer Applications of Jammer Future scope of Jamming Technology.
EVERY KID, EVERY TIME A Pediatric Patient Safety Initiative.
EFFECTS OF RESIDENTS ON EFFICIENCY IN AN EMERGENCY DEPARTMENT J. Silberholz, D. Anderson, E. Sze, J. Lim, E. Taneja, E. Tao, B. Kubic, K. Johnson, D. Kalowitz,
EFFECTS OF RESIDENTS ON EFFICIENCY IN AN EMERGENCY DEPARTMENT J. Silberholz, D. Anderson, M. Harrington, Dr. Jon Mark Hirshon, Dr. Bruce Golden 1.
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
Door to Doc (D2D) Reduces ED Patient “Walkout” Rate
1 An Algorithmic and Systematic Approach for Improving Robustness of TOA-based Localization Yongcai Wang, Lei Song Institute for Interdisciplinary Information.
Cleveland Clinic Science Internship Program How Fast Are We? Throughput Times for Admissions from the Emergency Department Brian Hom; Deborah Porter RN,
Us Case 5 ICU Event with Pharmacy and Pt Monitoring and Follow-up Care by PCP Care Theme: Transitions of Care, Medical Device Integration Use Case 15 Interoperability.
Spectrum Issues: Ultra-Wideband Operations May 20, 2003 Holiday Inn Hotel Rosslyn, VA James E. Hollansworth NASA Glenn Research Center NASA Spectrum Managers.
Information Security - City College1 Access Control in Collaborative Systems Authors: Emis Simo David Naco.
IT 와 인간의 만남 KAIST 지식서비스공학과 Experimental Research KSE966/986 Seminar Uichin Lee Sept. 21, 2012.
College of Engineering Anchor Nodes Placement for Effective Passive Localization Karthikeyan Pasupathy Major Advisor: Dr. Robert Akl Department of Computer.
Design of Work for Patient Safety Pascale Carayon, Ph.D. Procter & Gamble Bascom Professor in Total Quality Department of Industrial and Systems Engineering.
EMERGENCY SERVICE: A GENERALIZED FLEXIBLE SIMULATION MODEL Paola FACCHIN Department of Paediatrics, University of Padova, Italy Giorgio ROMANIN JACUR Department.
©2010 John Wiley and Sons Chapter 2 Research Methods in Human-Computer Interaction Chapter 2- Experimental Research.
Nissanka B. PriyanthaAnit Chakraborty Hari Balakrishnan MIT Lab for Computer Science The Cricket Location-Support System.
PACS in Radiology By Alanoud Al Saleh.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
SAGE Nick Beard Vice President, IDX Systems Corp..
The Health System in Australia The Health system and Medicare are based on a number of values or priorities.
Criticality Aware Smart Spaces T. Mukherjee Impact Lab ( Department of Computer Science & Engineering Ira A. Fulton School of Engineering.
Management Information System In Healthcare
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
IMPROVING PATIENT HANDOFFS Lolita Jackson Quality Improvement Project Professional Development Perspectives Nursing 3192 January 27, 2014.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Discussion Results Introduction From Lateral to Leader: A Study of Preschoolers’ Relationships with Peers Erin Podgorski & Dr. Carin L. Neitzel, The University.
Logical Database Design and the Rational Model
A New Technique for Sidelobe Suppression in OFDM Systems
Cisco Data Virtualization
Patient Medical Records
TRINITY UNIVERSITY HOSPITAL INTERNAL EXIT MEETING
Patient Voices Network
UNLV Data Governance Executive Sponsors Meeting
The Effect of Emergency Department Waiting Time
Department of Electrical Engineering
8.5 Modulation of Signals basic idea and goals
Unified Clinical Communication Workshop
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Presentation transcript:

Proximity Based Access Control for Smart- Emergency Departments * Sandeep Gupta*, T. Mukherjee*, K. Venkatasubramanian* and T. Taylor + *Department of Computer Science & Engineering Ira A. Fulton School of Engineering Arizona State University Tempe, Arizona, USA +Mediserve Information Systems Tempe, Arizona, USA *Work done in collaboration with MediServe Information Systems

Overview Motivation - Emergency Department Workflow Proximity Based Access Control (PBAC) Proximity zone design Positioning system Levels of Resource Access PBAC Model PBAC Policy Specifications Administrative Policies Access Control Policies Prototype Development Conclusions

Emergency Department - Background Emergency Departments (ED) help people experiencing medical emergencies which are life- threatening or can cause disabilities. Primary focus of ED is to provide patient care. ED procedures which minimizes distraction for caregivers is essential for its effectiveness.

Emergency Department- Problem Statement Patients follow well defined service paths in ED workflow. Several data systems need to be accessed, here, requiring unique log-in process. Such explicit session log-in/out process causes distraction for caregivers and result in vulnerabilities Patient Logged Triage Area Immediate Surgery Needs In-Patient care ED Treatment Area Waiting Area Admitted to Hospital Transfer to Another Facility Discharged Home Left Without Treatment IN Triage in Room out Areas where automated access to resources improves efficiency Automation of mundane access related tasks can improve ED efficiency.

Proximity Based Access Control (PBAC) Principal Idea is to automatically provide access to resources when a subject comes within its proximity. Challenges Design of proximity zone to a resource. Determination of proximity to a resource. Enforce appropriate information access policy. PROXIMITY-BASED ACESS TO RESOURCE

Design of Proximity Zone Definition of proximity is essential for PBAC Proximity zones characteristics: Number Shape (circle, square..) Size (radius, length of sides.. ) Factors influencing proximity zone: The access control policies for the resource. The geometry of the area. The accuracy of the positioning system. Radio environment of the area. PROXIMITY ZONES AROUND RESOURCES Zone 1 Zone 2

Sample Proximity Zone Design The application (resource, access policy) mandates S app  shape of the proximity zone R app  parameters for the shape Physical Zone Design: Based on the accuracy positioning system, we set R i  R i + Δ, for every i  R app Δ is the average error in the accuracy of the positioning system. Based on the geometry of the area, we set S app  S geo ’ S geo ’ is the new shape. Application mandated shape and size Actual Shape & size Δ

Determination of Proximity Proximity detection directly tied to accuracy of underlying positioning system. The radio environment plays an important role in positioning system accuracy. Need a system which works accurately indoors. Positioning system classification: RF based RF and ultra-sound based Ultra-Wide Band based Winner: Ultra-Wide Band, because…

Ultra-Wide Band (UWB) based positioning Better performance for indoor environments e.g. ED. Short signal pulse makes it less vulnerable to multipath-effects. Any interference noise is normalized over a wide signal band keeping the SNR high. UWB operated at 3-10 GHz frequency range where few other devices work, minimizing interference.

Access to Resources in PBAC Subjects have varying degrees of access privileges. If multiple subjects in resource proximity: Common set of privileges should be provided. Should not include access to subject specific information. Subject in proximity without intent of access should be recognized.

Levels of Access Authentication is a means of ensuring enforcement of appropriate privileges. Three levels of authentication: No-Auth: access restricted to publicly available information. Level – I: single challenge/response session, guarantees privileges corresponding to their organizational domain (ED, Trauma center). All subjects in the domain have common set of privileges. Level – II: additional challenge/response session required, allows access to sensitive information (patient data). Role Specific (Level II Auth) Public (No Auth) Domain Specific (Level I Auth)

PBAC - Model Access to resources provided based on: Proximity Current Level of Authentication Privileges given to subjects using Role Based Access Control (RBAC) model. Two types of roles: Organizational (OR): role assigned when subject joins the system, doctor in hospital. Group (GR): role assigned based on subject’s domain of work, surgeon in ED.

PBAC - Model Implementation Each resource maintains a list of roles (resource roles (RR)) and associated privileges called Access Control List (ACL). Subjects’ Group/ Organizational roles mapped on to RR in ACL by resource for access. Context information provides information on: Proximity Level of Authentication Others in Subject’s Domain and their privileges Group/ Org Role Role 1 Role 2 Role N Privileges for Role 1 Privileges for Role 2 Privileges for Role N f Context RR Privileges ACL

PBAC- Policy Specifications Specify rules for accessing service provided by resource, using PBAC. Two types of policies: Administrative Define the rules for administrative function within the system. Access Control Define the rules based on which access is given to subjects in proximity of resources.

Administrative Policies Specification Two principal policy classifications: Assigning Roles OR GR (can be given only to subjects with OR) Removing Roles OR (cannot be removed until all associated GRs for a subject are removed) GR Administrative Policies Assigning Roles Removing Roles ORGR

Access Control Policies Specification Access Control Policies Access to Unoccupied Resources Access to Occupied Resources Single Subject Multiple Subjects Random Choice Actual Proximity Log-in Initiate Single Subject Multiple Subjects Wait for Resource to free Direct access

Prototype Built a preliminary prototype for PBAC using a commercially available UWB-based positioning system from Ubisense Inc. Tested the accuracy of the positioning system at a Level-I Trauma Center ED in the Phoenix Area. Positioning accuracy of the system was within 2-8 inches. Implemented the PBAC specifications using the Ubisense™ positioning simulator and tested it in different scenarios (using 3 subjects): Single subject accessing un-occupied resource. Multiple subjects accessing un-occupied resource Subject is proximity without intent of access Temporary absence of a logged-in subject.

Conclusions Improving efficiency of ED necessary to provide better care to patients. Automating resource access in ED allows care-givers to focus on patients. Proximity-based Access Control (PBAC) useful for this purpose. We presented specifications for the PBAC and built a prototype to test its working.