Your browser does not support JavaScript!

Identity and access management systems

Identity and access management systems

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Security and Privacy of Electronic Healthcare Records: Concepts, paradigms and solutions — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This chapter discusses concepts and various research-oriented IAM techniques for growing connected healthcare system. Identity and access management (IAM) in a computer system includes a security framework, tools, and technologies to control access to critical information resources to legitimate users in the right context. IAM is even more challenging for healthcare organization as they are responsible for the protection of users identities and valuable medical records. Health care organizations are more prone to attacks than financial institutions. Data breaches in e-healthcare can lead to identifying theft, billing, and insurance frauds. To prevent such breaches IAM for health care must be even more secure and scalable to meet current challenges. IAM cannot be explained without learning the concept of identification.

Chapter Contents:

  • 4.1 Introduction
  • 4.2 ISO standards for security
  • 4.2.1 ISO/IEC 27001 standard
  • 4.2.2 ISO/IEC 9798
  • 4.3 Authentication, authorization, and access management
  • 4.3.1 Identification
  • 4.3.2 Authentication
  • 4.3.3 Authorization
  • 4.3.4 Access management
  • Access management activities
  • 4.4 Policies for identity and access management
  • 4.5 Security attacks and goals
  • 4.6 Identification and access management techniques
  • 4.6.1 Identity management techniques
  • Isolated identity management
  • Federated identity management
  • Centralized identity management
  • 4.6.2 Access management techniques
  • Discretionary access control (DAC)
  • Mandatory access control (MAC)
  • Role-based access control (RBAC)
  • 4.7 Identity and access management of e-healthcare systems: case study
  • 4.7.1 IoT-based healthcare security
  • 4.7.2 Smart e-health gateway
  • 4.7.3 Implementation components for the e-health care system
  • 4.8 Summary
  • References

Inspec keywords: health care; data protection; authorisation; computer network security; medical information systems

Other keywords: computer system; research-oriented IAM techniques; critical information resource access; connected healthcare system; identity and access management systems; healthcare organization; medical record protection; data breach; security framework; user identity protection

Subjects: Data security; Biology and medical computing; Computer networks and techniques; Computer communications

Preview this chapter:
Zoom in

Identity and access management systems, Page 1 of 2

| /docserver/preview/fulltext/books/he/pbhe020e/PBHE020E_ch4-1.gif /docserver/preview/fulltext/books/he/pbhe020e/PBHE020E_ch4-2.gif

Related content

This is a required field
Please enter a valid email address