ipl-logo

Roles Of A Role-Based Access Control Model In Healthcare

671 Words3 Pages

Running head: ROLE-BASED ACCESS CONTROL MODEL 1 Role-Based Access Control Model Student’s Name Institutional Affiliation Date Role-Based Access Control Model Role-based access control aims at regulating access to computer network or resources based on individual roles within an organization. Consequently, roles are defined based on competency, hierarchy and responsibility in an organization. Therefore, if properly implemented the model allows users to execute authorized tasks through a regulation of their actions based on flexible functions, constraints, and relationship. Under the model, roles can be created, discontinued or altered based on the organizational needs without necessarily updating the individual …show more content…

Firstly, they provide access to critical information on a patient’s data that may be compromised if access is not controlled. Secondly, these areas of security provide information on hospital administration; services provided and associated data that is critical for effective functioning of these facilities (Rajpoot et al., 2015). Therefore, access to these areas should only be done based on the people assigned to the tasks for security purposes. Again, these security areas are essential to the organization so that unauthorized entry into the system is blocked by people who may attempt to hack the system. The model provides user privileges in a single system and protects important security areas within an organization’s …show more content…

Therefore, the role of RBAC and Internet or Web infrastructure in an organization is to provide access to essential services. As a result, a Web can use new and additional sophisticated applications to access information and other necessary resources that may otherwise not be accessible in a given existing environment or due to potential threats to system posed by its Internet operations (Barka et al., 2015). With the RBAC model, person using an organizational system to access the Web of Things or Internet of Things may not have permission to perform operations on an individual level since such operations are based on their associated roles. Therefore, the model ensures that access to the Internet of Things is based on roles and thus can establish any new operations and deleted old operations by an individual within an organization. Integration of the RBAC model and the Web offers advantages of role-based access control to both intranet and Internet environments. Further, it can be incorporated into present systems without any need for modification of the server code such that it is portable to all Internet servers. Again, the model provides security to Internet resources by only allowing authorized permission based on one’s role in an organization (Barka et al., 2015). It also offers areas of control to these resources based on relevant architecture designed by a

More about Roles Of A Role-Based Access Control Model In Healthcare

    Open Document