{"title":"健康数据交换系统安全控制方案的性能","authors":"E. Gelenbe, Mihajlo Pavloski","doi":"10.1109/BlackSeaCom48709.2020.9235005","DOIUrl":null,"url":null,"abstract":"We propose an access control scheme to improve the security of a cross border health data access running under distributed systems such as OpenNCP that cooperate through message exchanges. The scheme allows messages that request data and services to cross different regional or national nodes after they are verified for security issues both by the sender and the receiver. It rejects those access requests that are detected to be malicious, and consequently throttles down the flow of permit messages via explicit feedback from threat detection software placed at the sender and the receiver. An analytical model is used to evaluate the message delay to determine the overhead caused by the enhanced security system, and numerical results illustrate the impact of attack rates and on the system’s performance.","PeriodicalId":186939,"journal":{"name":"2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Performance of a Security Control Scheme for a Health Data Exchange System\",\"authors\":\"E. Gelenbe, Mihajlo Pavloski\",\"doi\":\"10.1109/BlackSeaCom48709.2020.9235005\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose an access control scheme to improve the security of a cross border health data access running under distributed systems such as OpenNCP that cooperate through message exchanges. The scheme allows messages that request data and services to cross different regional or national nodes after they are verified for security issues both by the sender and the receiver. It rejects those access requests that are detected to be malicious, and consequently throttles down the flow of permit messages via explicit feedback from threat detection software placed at the sender and the receiver. An analytical model is used to evaluate the message delay to determine the overhead caused by the enhanced security system, and numerical results illustrate the impact of attack rates and on the system’s performance.\",\"PeriodicalId\":186939,\"journal\":{\"name\":\"2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BlackSeaCom48709.2020.9235005\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BlackSeaCom48709.2020.9235005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance of a Security Control Scheme for a Health Data Exchange System
We propose an access control scheme to improve the security of a cross border health data access running under distributed systems such as OpenNCP that cooperate through message exchanges. The scheme allows messages that request data and services to cross different regional or national nodes after they are verified for security issues both by the sender and the receiver. It rejects those access requests that are detected to be malicious, and consequently throttles down the flow of permit messages via explicit feedback from threat detection software placed at the sender and the receiver. An analytical model is used to evaluate the message delay to determine the overhead caused by the enhanced security system, and numerical results illustrate the impact of attack rates and on the system’s performance.