[PRL] Secondary use of data in EHR systems. (arXiv:1201.4262v1 [cs.PL])

Mitch mwand1 at gmail.com
Mon Jan 23 06:58:42 EST 2012


Hmm, AOP, security, analysis, continuations, interesting authors.

Sent to you by Mitch via Google Reader: Secondary use of data in EHR
systems. (arXiv:1201.4262v1 [cs.PL]) via cs.PL updates on arXiv.org by
<a href="http://arxiv.org/find/cs/1/au:+Yang_F/0/1/0/all/0/1">Fan
Yang</a>, <a
href="http://arxiv.org/find/cs/1/au:+Hankin_C/0/1/0/all/0/1">Chris
Hankin</a>, <a
href="http://arxiv.org/find/cs/1/au:+Nielson_F/0/1/0/all/0/1">Flemming
Nielson</a>, <a
href="http://arxiv.org/find/cs/1/au:+Nielson_H/0/1/0/all/0/1">Hanne
Riis Nielson</a> on 1/22/12

We show how to use aspect-oriented programming to separate security and
trust issues from the logical design of mobile, distributed systems.
The main challenge is how to enforce various types of security
policies, in particular predictive access control policies - policies
based on the future behavior of a program. A novel feature of our
approach is that advice is able to analyze the future use of data. We
consider a number of different security policies, concerning both
primary and secondary use of data, some of which can only be enforced
by analysis of process continuations.

Things you can do from here:
- Subscribe to cs.PL updates on arXiv.org using Google Reader
- Get started using Google Reader to easily keep up with all your
favorite sites
-------------- next part --------------
HTML attachment scrubbed and removed


More information about the PRL mailing list