Int
ern
at
i
onal
Journ
al of Ele
ctrical
an
d
Co
mput
er
En
gin
eeri
ng
(IJ
E
C
E)
Vo
l.
8
, No
.
6
,
Decem
ber
201
8
, p
p.
4724
~
4734
IS
S
N:
20
88
-
8708
,
DOI: 10
.11
591/
ijece
.
v
8
i
6
.
pp
4724
-
47
34
4724
Journ
al h
om
e
page
:
http:
//
ia
es
core
.c
om/
journa
ls
/i
ndex.
ph
p/IJECE
Trust En
hanced
Ro
l
e Ba
sed Ac
cess Control U
sing Gen
etic
Algorith
m
Sa
le
h
M
owla, Niharik
a Si
nh
a,
R
aghaven
d
ra
G
an
i
ga, Nisha
P.
Shett
y
Depa
rtment
o
f
I
nform
at
ion
&
C
om
m
unic
at
ion
T
ec
hnolog
y
,
Man
i
pal
Inst
it
ut
e
of
T
ec
hnolog
y
,
Ind
ia
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
Ma
r
13
, 201
8
Re
vised
Jun
26
, 201
8
Accepte
d
J
ul
11
, 2
01
8
Im
prove
m
ent
s
i
n
te
chnol
ogi
cal
i
nnovat
ions
have
bec
om
e
a
boon
for
business
orga
nizati
ons,
f
irms
,
insti
tut
io
ns,
et
c.
S
y
st
e
m
appl
ic
at
ions
are
bei
ng
deve
lop
ed
for
orga
nizati
ons
whethe
r
sm
al
l
-
sca
l
e
or
la
rge
-
sca
le.
Ta
king
int
o
conside
ra
ti
on
th
e
hie
r
arc
h
ic
a
l
n
at
ure
of
la
rg
e
o
rga
nizati
ons,
s
e
cur
ity
is
an
important
fa
ct
or
which
nee
ds
to
be
ta
ken
int
o
a
cc
ount
.
For
an
y
hea
lt
h
ca
r
e
orga
nizati
on
,
m
ai
nt
ai
ning
th
e
c
onfide
ntial
ity
an
d
int
egr
i
t
y
of
t
he
patient
s
’
rec
ords
is
of
utm
ost
importanc
e
while
ensuring
t
hat
they
ar
e
onl
y
ava
ilable
to
the
au
thorized
p
ersonne
l.
The
p
ape
r
dis
cusses
the
techniqu
e
of
Role
-
Base
d
Acc
ess
Control
(RBAC)
and
it
s
diffe
ren
t
aspe
ct
s
.
The
pape
r
a
lso
suggests
a
trust
enha
nc
ed
m
odel
of
RBA
C
implemente
d
with
sele
ction
a
nd
m
uta
ti
on
onl
y
‘Gene
t
ic
Algorit
hm
’.
A
pra
ct
i
cal
sc
ena
rio
invol
vin
g
hea
l
thcar
e
orga
nizati
on
h
a
s
al
so
bee
n
co
nsidere
d.
A
m
odel
has
bee
n
d
eve
lop
ed
to
conside
r
the
po
l
ic
i
es
of
diff
ere
n
t
he
al
th
depa
r
tments
and
how
it
aff
e
ct
s
th
e
per
m
issions
of
a
par
ti
cu
la
r
rol
e.
The
purpose
of
the
al
gor
it
hm
is
to
al
lo
ca
t
e
ta
sks
for
ev
er
y
emplo
y
ee
in
an
aut
om
at
ed
m
anne
r
and
ensure
s
t
hat
they
ar
e
not
over
-
burde
n
ed
with
th
e
wor
k
assigned.
In
a
ddit
ion,
the
trus
t
rec
ords
of
the
emplo
y
e
es
e
nsure
tha
t
m
al
ici
ous
users
do
not
gai
n
ac
c
ess
to
c
onfide
ntia
l
pat
i
ent
d
ata.
Ke
yw
or
d:
Algorithm
Data p
rivacy
Gen
et
ic
Healt
hcar
e
RB
AC
Trust
Copyright
©
201
8
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed
.
Corres
pond
in
g
Aut
h
or
:
Ra
gh
a
ve
ndra
Gan
i
ga
,
Dep
a
rtm
ent o
f Info
rm
at
ion
& C
omm
un
ic
at
io
n
Tec
hnol
og
y
,
Ma
nip
al
Insti
tu
te
o
f
Tech
nolo
gy
,
Ma
nip
al
, K
arn
at
a
ka,
India
.
Em
a
il
:
rag
ha
ve
ndra.
n@
m
anip
al
.ed
u
1.
INTROD
U
CTION
Role
-
Ba
sed
A
ccess
Con
tr
ol
is
a
m
od
el
thro
ug
h
w
hich
use
rs
can
acce
s
s
resour
ce
s
th
at
they
are
qu
al
ifie
d
f
or.
This
ca
n
be
ac
hieve
d
by
m
app
in
g
the
pe
rm
i
ssion
s
or
f
unct
ion
al
it
ie
s
to
ce
rtai
n
r
oles
a
nd
then
base
d
on
certai
n
crit
eria,
t
he
us
ers
are
assi
gned
t
he
r
ole
an
d
are
he
nce
pe
rm
i
tt
ed
to
acce
ss
the
res
ource
s.
Th
e
pap
e
r
disc
us
se
s
a
m
od
el
of
RB
AC
wh
ic
h
can
be
easi
ly
adopted
by
healt
hc
are
orga
nizat
io
ns
su
c
h
as
hos
pital
s,
cl
inics,
et
c.
Be
sides
ta
sk
al
lo
cat
ion
by
the
g
eneti
c
al
gorith
m
,
the
syst
e
m
will
al
so
recor
d
fee
db
ac
k
give
n
by
patie
nts
f
or
c
oncer
ne
d
em
plo
ye
es
to
ens
ur
e
that
they
are
trustwo
rthy
an
d
reli
able
s
o
a
s
to
acce
ss
pa
ti
ent
record
d
et
ai
ls.
1.1.
B
ackgr
ound
1.1.1. R
ole
-
Ba
sed A
c
cess
Contr
ol
Role B
ased A
c
ce
ss Con
t
ro
l i
s
a
m
et
ho
d
thr
ough whic
h
us
e
r
access to co
m
pu
te
r
or n
et
w
ork reso
urces
is
regulat
ed
on
the
basis
of
th
e
ro
le
s
they
ha
ve
bee
n
assi
gned
[
1].
T
her
e
a
re
dif
fer
e
nt
m
od
el
s
that
ha
ve
bee
n
i
m
ple
m
ented
i
n
this
re
gard.
A
us
e
r
can
ha
ve
m
ulti
ple
ro
le
s
and
e
ac
h
r
oles
can
be
as
sign
e
d
with
m
ulti
ple
functi
onal
it
ie
s
as
show
n
in
Fi
gure
1.
Va
rio
us
facto
rs
are
c
on
si
der
e
d
wh
e
n
it
com
es
to
assigni
ng
us
e
r
s
their
ro
le
s
(
based
on
the
a
pp
li
cat
ion
or
syst
em
)
and
once
the
c
rite
ria
has
bee
n
fu
lfil
le
d,
the
us
e
r
ca
n
acce
ss
th
e
resou
rces
an
d
functi
onal
it
ie
s
m
app
ed
t
o
the
resp
ect
ive
ro
le
.
This
le
ads
to
the
descr
i
ptio
n
of
two
j
a
rgo
ns
i.e.
ro
le
s
a
nd
pe
rm
issi
on
s.
A
n
organiz
ational
r
ole
is
a
way
to
pro
vid
e
a
utho
rita
ti
ve
entit
le
m
ent
to
pe
op
le
entit
ie
s
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Tru
st E
nh
an
ce
d
R
ole B
as
e
d
A
ccess C
ontrol
Using
Genet
ic
Algo
rit
hm
(
Sa
l
eh
M
owla
)
4725
work
i
ng
in
the
orga
nizat
ion.
Dep
e
ndin
g
on
the
num
ber
of
res
pons
i
bili
ti
e
s
an
d
sig
nifica
nce
of
the
r
ole,
th
e
orga
nizat
ion
buil
ds
a
hiera
rc
hical
syst
e
m
so
as
t
o
f
ollo
w
a
sm
oo
th
chai
n
of
c
omm
and
.
Per
missio
ns
can
be
ref
e
rr
e
d
to
as
the
f
un
ct
io
nalit
ie
s
or
a
uthority
that
has
bee
n
de
le
gated
to
a
r
ole.
It
is
the
du
ty
and
res
pons
i
bili
ty
of the
perso
n
a
ssign
e
d
a
role t
o per
form
the assign
e
d pe
rm
is
sion
s
sati
sfacto
rily
as r
e
qu
ire
d.
Figure
1. Ge
ne
ral over
view
of
an
RB
AC Syst
e
m
1.1.2. Ge
ne
tic
Algori
th
m
The
ge
netic
al
gorithm
was
i
ns
pi
red
by
the
proce
ss
of
ge
ner
at
io
n
of
D
NA
in
anim
al
s
an
d
fo
ll
ows
Darwinia
n’
s
pri
nciple
of
“s
urvival
of
the
fitt
est
”.
The
us
e
of
this
al
gorith
m
has
ha
d
va
ri
ou
s
su
cce
sses
i
n
area
s
li
ke
prob
le
m
s
relat
ed
to
gl
ob
al
opti
m
iz
a
t
ion
,
sec
ur
it
y
(
and
c
rypto
gra
ph
y
)
as
well
as
tim
e
-
t
abling.
T
he
al
gorithm
con
s
iders
a
nu
m
ber
of
par
am
et
ers
w
hich
are
ta
ke
n
int
o
c
onsid
erati
on
an
d
a
re
ap
plied
on
the
basis
of the
require
m
ents and the
pur
po
se
of t
he a
pp
li
cat
io
ns
.
1.1.2.
1.
Sele
cti
on
Sele
ct
ion
is
t
he
proces
s
of
se
le
ct
ing
be
tt
er
s
olu
ti
ons
t
han
the
on
e
s
a
vaila
ble.
T
he
i
dea
i
s
to
sel
ect
t
he
best
genes
so
that
they
can
pa
ss
ov
e
r
to
the
ne
xt
gen
e
rati
on
thu
s
al
ig
ning
it
sel
f
with
Darw
in’s
“su
r
viv
al
of
the
fitt
est
”
theor
y.
Sele
ct
ion
m
ain
ly
invol
ves
th
e
sel
ect
ion
of
appr
opriat
e
pa
ren
ts
so
that
t
he
y
can
ge
ner
at
e
off
-
sp
ri
ng
s
of
th
e
furthe
r
ge
ner
at
ion
s
.
W
it
h
res
pect
to
the
al
gorithm
,
the
sel
ect
ion
proce
ss
is
facil
it
a
te
d
by
the
evaluati
on
of
a
‘f
it
nes
s’
funct
ion
.
I
f
the
fitne
ss
le
vel
of
a
s
ol
ution
is
a
bove
a
certai
n
us
er
-
def
i
ned
t
hr
es
hold,
it
is
sel
ect
ed.
F
it
ness
functi
on
can
be
obj
ec
ti
ve
or
sub
j
ect
ive.
A
n
obj
ect
ive
functi
on
is
on
e
w
hich
s
el
ect
s
so
luti
ons
base
d
on
a
m
at
hem
at
ic
al
m
od
el
or
a
com
pu
te
r
s
ol
ution
w
her
eas
a
sub
j
ect
ive
f
un
ct
io
n
is
one
wh
e
re
the s
olu
ti
on is
chosen
b
y
hum
ans who
co
ns
i
der the s
olu
ti
on
bette
r
tha
n
t
he
wor
se
ones
.
1.1.2.
2.
Cr
os
s
ov
er
and
Rec
om
bina
tion
Cros
s
over
in
ge
netic
al
go
rit
hm
is
analog
ous
to
the
cro
ss
ov
er
in
bio
l
og
ic
a
l
rep
r
oductio
n.
More
tha
n
on
e
pa
re
nt
is
s
el
ect
ed.
Using
the
ge
netic
c
onte
nt
of
the
sel
e
ct
ed
pa
re
nt,
one
or
m
or
e
off
s
pr
i
ng
s
are
pr
oduce
d.
This
ste
p,
al
ong
with
m
utati
on
,
is
m
ai
nly
to
ge
ner
at
e
a
no
t
her
ge
ner
at
ion
of
s
olu
ti
ons
f
r
om
the
s
el
ect
ed
par
e
nts.
To
produce
a
new
s
olu
ti
on
us
in
g
the
e
xisti
ng
ones,
a
pair
of
pa
ren
ts
is
sel
ect
ed
from
the
re
m
ai
ning
so
luti
ons.
T
he
new
s
o
luti
on
t
hat
is
ob
ta
ine
d
gen
e
rall
y
sh
ar
es
m
any
of
it
s
par
e
nts’
c
har
ac
te
risti
cs.
The
proces
s
of g
e
ner
at
io
n o
f new
so
l
utions
f
r
om
ex
ist
ing
on
e
s c
on
ti
nues
ti
ll
a so
luti
on
of r
e
qu
i
red siz
e is o
btaine
d.
Ther
e
are
m
any
diff
e
re
nt
ty
pe
s
of
c
ro
s
sove
r.
The
fir
st
ty
pe
of
cr
os
s
ov
e
r
us
es
a
sin
gle
cr
os
s
ov
e
r
po
i
nt
in
both
the
pa
ren
t
stri
ngs
[
2].
The
part
of
the
strin
g
beg
i
nn
i
ng
fro
m
on
e
chrom
os
om
e
t
il
l
it
s
cr
os
s
ov
e
r
po
i
nt
is
ta
ken
f
ro
m
on
e
pa
ren
t
,
an
d
from
the
sec
ond
par
e
nt,
it
s
par
t
of
the
s
tring
from
the
cro
ss
over
po
i
nt
ti
l
l
the end is
take
n
as
sho
wn in t
he
Fi
gure
2.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
8
, N
o.
6
,
Dece
m
ber
201
8
:
4724
-
4734
4726
Figure
2. Sin
gl
e Po
i
nt Cr
os
s
over
The
seco
nd
ty
pe
is
a
two
po
i
nt
cro
ss
over
,
wh
e
rein
the
pa
rt
of
the
strin
g
sta
rting
f
ro
m
t
he
be
ginnin
g
of
the
c
hrom
os
om
e
t
il
l
the
fir
st
cro
ss
over
point
is
ta
ken
f
rom
the
first
parent,
the
par
t
of
the
strin
g
fro
m
the
first
to
the
sec
ond
cr
os
s
over
po
i
nt
is
ta
ken
from
the
second
pa
ren
t,
a
nd
f
ro
m
the
second
cr
os
s
ov
e
r
po
int
ti
l
l
the end
of the
chrom
os
om
e is
taken f
ro
m
the
f
irst
par
e
nt
[2
]
as s
how
n
in
th
e Fig
ur
e
3.
Figure
3. Tw
o Point C
rosso
ve
r
Un
i
form
cro
ss
ov
e
r
has
the
c
hild
car
ryi
ng
pa
rts
of
the
string
ra
ndom
ly
c
op
ie
d
f
r
om
the
first
as
well
as the seco
nd parent. Cr
os
s po
ints can b
e rando
m
ly
ch
os
en
al
ong
the str
in
gs
of the
par
e
nt
s.
If
the mi
xin
g
rati
o
of
both the pa
r
ents is 50
-
50, t
hen
t
he
c
hild
will
ap
pro
xim
a
te
ly
h
ave h
al
f
the string
from
the f
irst a
nd
ha
lf f
r
om
the sec
ond par
ent [2]
as s
how
n
in
the
Fig
ur
e
4.
Figure
4. U
nif
or
m
Cro
ss
over
An
a
rithm
et
ic
op
e
rati
on
ca
n
al
so
be
de
ci
ded
upon
be
foreh
a
nd.
T
hi
s
arit
hm
e
ti
c
op
e
rati
on
is
perform
ed
on
the
pa
re
nt
bits
an
d
ca
n
hen
c
e
be
us
e
d
to
cal
culat
e
the
r
esulti
ng
child
bits.
T
he
a
rith
m
et
i
c
op
e
rati
on ca
n be a
ny as s
how
n
in
Fig
ure
5.
Figure
5. A
rith
m
et
ic
Cro
sso
ve
r
So
m
et
i
m
es,
three
pa
re
nts
are
us
e
d
to
pro
du
ce
one
offspri
ng.
I
n
t
his
cas
e
,
bit
-
wise
c
om
par
ison
ta
ke
s
place
with
bits f
ro
m
all
the thr
ee
p
a
ren
ts.
A
cc
ordi
ng
ly
, t
he result
ing
c
orres
pond
ing
c
hild
bit i
s
set
to 0
or
1.
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Tru
st E
nh
an
ce
d
R
ole B
as
e
d
A
ccess C
ontrol
Using
Genet
ic
Algo
rit
hm
(
Sa
l
eh
M
owla
)
4727
1.1.2.
3.
Mut
ati
on
Muta
ti
on
re
fers
to
the
m
od
ific
at
ion
do
ne
in
the
chrom
os
om
e
in
or
de
r
to
ob
ta
in
new
s
ol
ution
s
.
It
is
done
so
as
to
increase
the
dive
rsity
of
the
popula
ti
on
ch
r
om
os
o
m
e
con
te
nt.
Li
ke
cr
os
s
over
,
e
ven
m
uta
ti
on
i
n
gen
et
ic
al
go
rithm
is
a
nalogo
us
to
ge
netic
m
uta
ti
on
.
T
he
re
are
di
ff
e
r
e
nt
ki
nd
s
of
m
utati
on
m
et
hods
or
m
uta
ti
on
oper
at
or
s.
A
c
om
bin
at
ion
of
t
he
m
et
ho
ds
known
ca
n
al
s
o
be
us
e
d
[
2].
F
li
p
bit
m
utati
on
is
a
m
uta
ti
on
m
et
ho
d
in
w
hich
th
e
bits
of
the
a
vaila
ble
geno
m
e
are
in
ver
te
d.
A
m
utati
on
op
e
rato
r
ca
n
w
ork
on
integer
,
fl
oat,
s
t
ring,
et
c.
ge
ne
s.
I
n
s
wap
m
utati
on
,
tw
o
posit
ion
s
are
ch
os
e
n
on
th
e
sel
ect
ed
ch
r
om
os
ome
an
d
the v
al
ues
at
t
he
se posit
ions a
re swap
pe
d
as
sh
ow
n
in
the
F
igure
6.
Figure
6. S
wap Muta
ti
on
Ther
e
is
a
m
ut
at
ion
m
et
ho
d
c
al
le
d
scram
ble
m
uta
ti
on
in
whic
h
a
sub
par
t
of
the
c
hrom
os
om
e
is
ta
ken
an
d
th
e
values
in
t
his s
ubpa
rt is s
huff
l
ed ran
dom
l
y as sh
own
i
n
t
he Fi
gure
7.
Figure
7. Scra
m
ble Mutat
ion
In
i
nv
e
rsion m
utati
on
, a
sub
pa
rt o
f
t
he
c
hro
m
os
o
m
e is sel
e
ct
ed
an
d
the s
ubset
strin
g gets
inv
e
rted
as s
how
n
in
the Fig
ure
8.
Figure
8. I
nv
e
r
sion M
utati
on
In
un
if
orm
m
u
ta
ti
on
the
valu
e
of
the
sel
ect
ed
ge
ne
is
rep
l
aced
by
a
valu
e
within
the
uppe
r
bo
und
an
d
lo
w
e
r
bound
that
is
sp
eci
fied
by
the
us
e
r.
Bi
t
string
m
utati
on
inv
erts
the
bi
ts
of
the
chrom
os
om
e
a
t
ran
dom
po
sit
io
ns
[
2] as
shown i
n
t
he Fi
gure
9.
Figure
9. Bi
t String M
utati
on
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
8
, N
o.
6
,
Dece
m
ber
201
8
:
4724
-
4734
4728
1.2. Pro
blem
Def
ini
ti
on
Using
the
RB
AC
m
od
el
,
it
i
s
po
ssi
ble
for
us
ers
to
sim
ply
log
in
an
d
ba
sed
on
their
cr
eden
ti
al
i.e.
ro
le
, t
hey are a
ble to access t
he
r
eso
urces o
r perm
issi
on
s m
app
e
d
to t
hat role
. T
his m
app
ing
of
ro
le
s a
nd u
s
ers
can
be
do
ne
by
the
adm
in
or
the
hea
d
of
t
he
orga
nizat
ion
that
will
hav
e
t
he
aut
hority
over
t
he
entire
s
yst
e
m
.
Howe
ver,
it
is
no
t
possi
ble
for
a
sing
le
adm
i
n
to
m
anag
e
th
e
ro
le
s
and
the
per
m
issi
on
s
m
app
e
d
to
them
for
a
la
rg
e
organ
iz
at
ion
with
hu
ndred
s
a
nd
th
ou
s
ands
of
em
plo
ye
es.
In
a
ddit
ion
t
o
m
anag
in
g
the
r
oles
a
nd
the
per
m
issi
on
s,
t
he
adm
in
will
ha
ve
t
o
m
anag
e
the
num
ber
of
us
e
rs,
al
locat
e
r
oles
to
the
use
rs
a
nd
e
ns
ure
that
on
ly
qual
ifie
d
us
ers
a
re
el
igible
to
acce
ss
the
res
ources
or
perf
or
m
fu
nc
ti
on
al
it
y.
Be
aring
this
pro
blem
in
m
ind
,
the
idea
is
to
i
m
ple
m
ent
a
‘G
eneti
c
Al
gorithm
’
wh
ic
h
can
be
a
pp
l
ie
d
to
the
RB
AC
m
od
el
of
healt
hcar
e
orga
nizat
ion
s
. Usin
g
t
his alg
ori
thm
, u
sers wi
ll
b
e aut
horize
d for thei
r per
m
issi
on
s a
utom
at
ic
ally.
The
a
dm
in
si
mp
ly
has
to
m
ain
ta
in
the
datab
ase
for
the
em
plo
ye
es
a
nd
th
e
per
m
issi
on
s
of
eac
h
r
ole
.
On
ce
an
em
plo
ye
e
log
s
into
the
syst
em
,
the
Gen
et
ic
Algori
thm
will
ta
ke
into
acc
ount
th
e
r
ole
of
t
he
use
r
a
nd
assign
him
his
ta
sk
s
a
nd
pe
rm
issi
on
s
of
the
da
y.
At
the
sam
e
tim
e,
it
is
i
m
per
at
ive
that
use
rs
of
su
c
h
a
s
yst
e
m
are
reli
able
a
nd
tr
us
tw
ort
hy
enou
gh
to
acc
ess
co
nfi
de
ntia
l
inf
or
m
at
ion
because
le
ak
a
ge
of
pri
vate
patie
nt
inf
or
m
at
ion
le
ads
to
the
he
al
thcare
organi
zat
ion
inc
urring
hea
vy
loss
es
in
te
rm
s
of
fi
nan
ce
as
well
as
cred
i
bili
ty
.
Thu
s
it
is
esse
ntial
to
eval
uate
the
tru
stw
or
t
hin
ess
of
the
e
m
plo
ye
e
so
th
at
the
pro
ba
bili
t
y
of
m
al
ic
iou
s u
se
r
s g
ai
ning acces
s to
se
ns
it
ive i
nfor
m
at
ion
bec
om
es
m
ini
m
al
.
1.3.
Li
ter
atur
e R
e
view
A
good
am
ou
nt
of
re
searc
h
has
been
co
nd
ucted
i
n
bo
t
h
acce
ss
co
ntr
ol
syst
e
m
s
as
well
as
gen
et
ic
al
gorithm
s.
Ferr
ei
ra
et
al
.
propose
d
a
m
odel
cal
l
BTG
-
RBA
C
w
hich
fa
ci
li
ta
te
s
the
use
rs
to
br
ea
k
t
he
glass
rather
tha
n
be
den
ie
d
acce
ss
[3
]
.
Bi
ndi
gan
a
vale
an
d
O
uyang
intr
oduce
d
RB
AC
in
a
ty
pical
J2
E
E
e
nterprise
app
li
cat
io
n
[
4].
I
n
order
to
m
ini
m
iz
e
the
disad
va
ntages
of
RB
AC
syst
e
m
s,
a
m
od
el
was
dev
el
op
e
d
wh
i
c
h
a
dd
e
d
at
trib
ut
es
(A
B
AC)
to
the
existi
ng
RB
AC
syst
e
m
[5
]
.
T
o
f
ur
t
he
r
im
pr
ov
e
th
e
syst
e
m
,
the
Bi
-
la
ye
r
Access
C
on
tr
ol
m
od
el
was
pro
po
se
d
by
Alsh
e
hr
i
a
nd
Ra
j
w
hich
co
m
bin
ed
the
be
nef
it
s
of
RB
A
C
an
d
ABAC
[
6].
Wo
no
ho
e
sod
o
and
Ta
ri
propo
sed
two
m
od
e
ls
viz.
S
W
S
-
R
BAC
(for
sin
gl
e
web
serv
ic
e
s)
an
d
C
W
S
-
RB
AC
(
for
global
we
b
serv
ic
es
)
[7
]
.
W
it
h
res
pect
to
healt
hca
re
orga
nizat
ion
s
,
c
on
t
rib
ution
has
been
m
ade
to
secu
r
e
com
m
un
ic
at
i
on
c
ha
nn
el
s
by
m
eans
of
a
n
acce
ss
co
ntr
ol
syst
e
m
fo
r
m
ob
il
e
ag
ents
be
tween
healt
hcar
e
org
ani
zat
ion
s
[
8]
and
th
reat
m
od
el
s
hav
e
al
so
be
en
desi
gn
e
d
a
nd
dev
el
op
e
d
f
or
re
gula
ti
ng
a
ccess
in h
eal
th
care i
ns
ti
tutes [
9].
Kh
a
n
a
nd
Sa
kam
ur
a
[
10]
pr
opose
d
a
Discre
ti
on
ary
Access
Co
ntro
l
(
DA
C
)
f
ram
ewo
r
k
t
ha
t
pro
vid
es
healt
hcar
e
org
anizat
ion
s
a
gainst
secu
rity
at
t
acks
an
d
ascer
ta
ins
c
onfide
nt
ia
li
t
y
of
patie
nt
data.
A
trust
-
awar
e
RB
AC
m
od
el
has
bee
n
use
d
to
dem
on
strat
e
so
ci
al
healt
hcar
e
netw
orks
ap
pl
ic
at
ion
in
a
cl
oud
env
i
ronm
ent
[1
1].
A
sim
il
ar
crypto
gr
a
phic
RB
AC
m
od
el
has
al
s
o
been
de
sign
e
d
t
hat
co
ns
ide
rs
in
he
rita
nce
of
the
r
oles
as
we
ll
their
hiera
rc
hy
in
t
he
eval
ua
ti
on
of
t
ru
st
w
or
t
hin
ess
of
th
e
us
e
rs
a
nd
ho
w
it
can
be
de
plo
ye
d
on
the
cl
oud
[
12
]
.
Y
u,
W
a
ng,
Re
n
a
nd
L
u
ha
ve
c
om
bin
ed
Attrib
ute
-
bas
ed
e
ncr
y
ption,
pro
xy
re
-
e
ncry
ption
and
la
zy
re
-
e
nc
ryptio
n
to
achiev
e
use
r
acc
ess
pr
i
vilege
confide
ntial
it
y
and
sec
ret
key
accounta
bili
ty
of
the
us
ers
[
13]
.
A
n
em
erg
ency
m
edical
syst
em
has
al
s
o
been
dev
el
op
e
d
t
o
e
nab
le
ubiq
uito
us
acce
s
s
to
m
edical
serv
ic
es
[
14
]
.
A
r
ole
-
base
d
tr
us
t
m
anag
em
e
nt
m
od
el
has
al
so
been
pro
pos
ed
al
on
g
with
a
detect
ion
al
gorithm
to
avo
i
d
vio
la
t
ion
of
the
le
ast
-
pr
i
vilege
pri
nciple
of
RB
A
C
[1
5].
S
ur
ya
ni,
Su
li
sty
o
an
d
W
idya
wan
use
d
a
Mod
ifie
d An
t
Colo
ny alg
or
it
hm
to
cal
culat
e the selec
ti
on
proces
ses
of trust
able ob
j
ect
s
[
16
]
.
2.
THE
PROPO
SED
METHO
D
Ther
e
ha
ve
be
en
diff
e
re
nt
im
ple
m
entat
ion
s
an
d
m
od
ifie
d
us
e
of
this
al
gorithm
.
Sh
iu
a
nd
Sze
t
o
dev
el
op
e
d
a
m
utati
on
-
only
ge
netic
al
gorith
m
to
opti
m
iz
e
ai
rpor
t
ca
pacit
y
util
iz
at
ion
[
17]
.
W
it
h
the
he
lp
of
the
al
gorithm
,
it
was
po
ssibl
e
to
reali
ze
a
ro
ste
rin
g
s
olu
t
ion
that
ex
per
i
m
ents
with
w
ork
sh
i
fts
of
doct
ors
wh
il
e
m
a
intai
nin
g
qual
it
y
of
serv
ic
es
[
18
]
.
A
n
ada
ptive
loca
l
search
an
d
im
m
igran
t
schem
e
in
[1
9]
com
bin
ed
with
an
a
da
ptive
ge
netic
al
gorithm
has
help
ed
so
l
ve
d
sta
ff
routin
g
pro
ble
m
in
healt
hcare
orga
niz
at
ion
s
al
ong
with
im
pr
ov
in
g
the
pe
rfo
rm
ance
of
the
or
iginal
ge
netic
al
gorithm
.
Ca
i
et
al
.
[2
0]
m
i
nim
iz
ed
the
costs
of
al
locat
ing
sta
f
f
f
or
over
-
ti
m
e
w
ork
a
nd
optim
iz
ed
a
so
l
ution
f
or
sche
du
li
ng
sta
ff
of
m
ixed
s
kill
s
unde
r
m
ul
ti
ple
crit
eria
us
in
g
gen
et
ic
al
gorithm
.
Chang
-
Ch
un
Tsai
et
al
.
[21]
pro
po
s
ed
a
m
et
hod
to
reduce
i
nfeasi
ble
so
luti
ons
i
n
ge
netic
al
gorith
m
.
This
pa
per
appr
oach
es
the
de
velo
pm
ent
of
an
RB
AC
s
yst
e
m
fo
r
heal
thcare
orga
nizat
ion
by
autom
a
ti
ng
the
ro
le
-
pe
rm
is
sion
m
app
in
g
process
with
th
e
help
of
a
va
ri
ant
gen
et
ic
al
gorithm
.
In this sect
io
n,
the pr
opos
e
d
a
rch
it
ect
ure is
di
scusse
d
wit
h
r
espect t
o a sce
nar
i
o
in
a
healt
hcar
e
org
a
nizat
ion
.
2.1. Heal
th
c
ar
e Organiz
at
i
on
The
m
od
el
assum
es
that
a
nu
m
ber
of
hos
pital
s
and
cl
inics
hav
e
acce
s
s
to
the
dat
abase
con
ta
in
i
ng
patie
nt
recor
d
file
s
and
the
de
par
tm
ent
assig
ne
d
to
them
.
The
m
od
el
can
be
ap
plied
to
a
sing
le
heal
thcar
e
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Tru
st E
nh
an
ce
d
R
ole B
as
e
d
A
ccess C
ontrol
Using
Genet
ic
Algo
rit
hm
(
Sa
l
eh
M
owla
)
4729
orga
nizat
ion
a
nd
can
al
s
o
be
scal
ed
to
i
nclu
de
oth
er
s
easi
ly
.
The
c
onstrai
nt
with
acce
ssing
t
he
databas
e
is
that
the
patie
nts
th
e
m
sel
ves
nee
d
to
aut
horize
the
hos
pital
s
to
acce
ss
their
r
ecords.
C
onsid
er
a
sce
nar
io
wh
e
re
a
patie
nt
is
dissa
ti
sfied
with
t
he
ser
vices
an
d
treatm
ent
pro
vid
e
d
by
a
hea
lt
hcar
e
or
gan
iz
at
ion
.
He
ca
n
op
t
t
o
seek
for
t
reatm
ent
pr
ov
i
ded
by
ano
t
her
hos
pi
ta
l
or
cl
inic
i
nt
egr
at
ed
into
th
e
RB
AC
syst
e
m
by
pr
ovidi
ng
them
the
consent
to
acce
ss
hi
s
healt
h
rec
ords.
It
avo
i
ds
un
necessa
ry
do
c
um
entat
ion
an
d
pot
ential
m
isc
o
m
m
un
ic
at
ion
s
betwee
n
the
hos
pital
s
reg
ar
ding
the
pa
ti
ent
since
th
e
detai
ls
can
be
acce
ssed
fro
m
the
database
.
2.2. Speci
aliz
at
ion
dep
artme
nt
s
The
m
od
el
ta
ke
s
into
c
onsid
erati
on
f
our
he
al
th
de
par
tm
e
nts
prese
nt
in
each
or
gan
iz
at
ion
,
nam
el
y
Ca
rd
iol
og
y,
N
eurolo
gy,
Gyn
ecolo
gy
an
d
G
ener
al
Surg
e
ry
.
A
ddit
ion
a
nd
rem
ov
al
of
de
par
tm
ents
sp
ec
ific
to
ever
y
healt
hca
re
org
a
nizat
io
n
can
be
ea
sil
y
accom
m
od
ated
.
Eac
h
de
pa
rtm
ent
will
hav
e
their
own
set
of
patie
nts
that
th
ey
are
res
pons
i
ble
f
or
a
nd
nee
d
to
keep
t
rack
of.
The
syst
em
has
bee
n
de
sign
e
d
in
s
uc
h
a
way
that
the
de
pa
rtm
ents
can
rec
omm
end
the
pa
ti
ent
for
f
ur
t
her
tr
eat
m
e
nt
by
an
oth
e
r
de
par
tm
ent
throu
gh
t
he
RB
AC
syst
e
m
.
The
r
ecom
m
end
ed
de
partm
ent
thu
s
ga
ins
acce
ss
to
the
pa
ti
ent
records
with
ou
t
th
e
involvem
ent
of
any
pap
e
rwork.
F
or
e
xam
pl
e,
after
a
gyne
colo
gist
delive
rs
a
new
bor
n
bab
y,
the
doct
or
m
ay
reco
m
m
end
th
e p
at
ie
nt
t
o
see
k
a
dd
it
i
onal
ca
re fr
om
a p
edia
tric
ia
n.
2.3. Au
thori
t
ati
ve R
oles
The
init
ia
l
syst
e
m
assum
es
that
there
a
re
m
any
em
plo
ye
es
in
each
healt
hc
are
or
gan
iz
at
ion
broa
dly
div
ide
d
int
o
f
our
r
oles
viz.
Re
cepti
on
ist
,
Nurses,
In
te
rns
and
Do
ct
or
s
.
The
syst
em
c
an
accom
m
od
at
e
the
add
it
io
n
of
othe
r
disti
nctive
r
oles
as
well
.
E
ach
r
ole
has
it
s
own
set
of
f
unct
ion
al
it
ie
s
an
d
per
m
issi
o
ns
wh
ic
h
it
is
resp
onsibl
e
for.
Ta
ble
1
giv
es
a
br
ie
f
over
view
of
t
he
functi
onal
it
ie
s
assigne
d
to
ea
ch
r
ole
rec
ogni
zed
in
the h
eal
t
hc
are
orga
nizat
ion
s
.
Table
1.
O
verv
ie
w
of R
oles a
nd Pe
rm
issi
on
s in Heal
thcare
Orga
nizat
ion
Sr.
No.
Ro
le
Per
m
iss
io
n
s
1
.
Recep
tio
n
ist
Access Pati
en
t I
n
f
o
r
m
atio
n
and
File
Reco
rds
View App
o
in
t
m
en
ts o
f
the Depart
m
e
n
t
Sch
ed
u
le App
o
in
t
m
e
n
ts
Delete
Ap
p
o
in
t
m
e
n
ts
No
tif
y
patien
ts an
d
oth
er
u
sers o
f
the
syste
m
2
.
Nu
rse
Access Pati
en
t I
n
f
o
r
m
atio
n
and
File
Reco
rds
View App
o
in
t
m
en
ts o
f
the Depart
m
e
n
t
Sen
d
details
f
o
r
testin
g
View
Test Resu
lts
3
.
Intern
Access Pati
en
t I
n
f
o
r
m
atio
n
and
File
Reco
rds
View App
o
in
t
m
en
ts o
f
the Depart
m
e
n
t
View
Test Resu
lts
W
rit
e Rep
o
rts
Ass
ist in
Surg
er
y
4
.
Res
id
en
t Docto
r
Access Pati
en
t I
n
f
o
r
m
atio
n
and
File
Reco
rds
View App
o
in
t
m
en
ts o
f
the Depart
m
e
n
t
Perf
o
r
m
Surg
e
ry
View Rep
o
rts and
Test Resu
lts
Su
p
ervis
e and
teac
h
intern
s
2.4.
Em
plo
yee
C
rede
nt
i
als
In
or
der
to
a
pply
the
Gen
et
ic
Algorithm
to
t
he
RB
AC
m
od
el
,
we
will
be
assigni
ng
the
use
rs
of
the
syst
e
m
with
a
n
ID
wh
e
re
th
e
dig
it
s
them
s
el
ves
sign
i
fy
an
aspect
of
the
or
ga
nizat
io
n.
The
Use
r
I
D
is
of
the
form
AB
-
CD
-
EF
-
GH
wh
e
re
A,
B,
C,
D,
E
,
F,
G
an
d
H
r
epr
ese
nt
di
gits
fr
om
0
-
9.
The
m
od
el
assum
e
s
that
m
or
e
than
one
healt
hca
re
organ
iz
at
io
n
a
re
sh
a
rin
g
a
co
m
m
on
central
data
base.
Thi
s
ens
ures
t
hat
patie
nt
inf
or
m
at
ion
can
be
s
ha
red
w
it
h
ano
t
her
ho
sp
it
al
prov
i
ded
the
patie
nt
giv
es
his
c
onse
nt
.
Table
2
give
s
the
descr
i
ption o
f
t
he
em
plo
ye
e I
D.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
8
, N
o.
6
,
Dece
m
ber
201
8
:
4724
-
4734
4730
Table
2.
Desc
ription o
f
Em
ploy
ee ID
Dig
its
Sig
n
if
ican
ce
Descripti
o
n
Exa
m
p
le
AB
Ho
sp
ital
The f
irst two d
ig
its sig
n
if
y
which
ho
s
p
ital or health
care
o
rgan
izatio
n
the u
s
er
is wo
rkin
g
in
11
-
Ho
sp
ital A
12
-
Ho
sp
ital B
13
-
Clin
ic A
14
-
Ho
sp
ital C
CD
Dep
art
m
en
t
The th
ird an
d
the f
o
u
rth d
ig
it tog
eth
e
r
sig
n
if
y
the d
ep
art
m
e
n
t
th
e us
er
b
elo
n
g
s to
in th
e org
an
izatio
n
10
-
Card
io
lo
g
y
20
-
Neu
rolo
g
y
30
-
Gy
n
ecol
o
g
y
40
-
Gen
eral
Su
rger
y
EF
Ro
le
The f
if
th
and
the si
x
th
dig
it r
ep
resent th
e r
o
le of
the u
ser
10
-
Recep
tio
n
ist
20
-
Nu
rse
30
-
Intern
40
-
Res
id
en
t Docto
r
GH
Reg
istratio
n
Nu
m
b
er
The last two
dig
its
represen
t the
regis
tration
nu
m
b
e
r
allo
t
ted
to
th
e us
er
b
y
the
org
an
izatio
n
.
01
-
User 1
02
-
User 2
03
-
User 3
04
-
User 4
2.5.
P
at
ie
n
t Ro
le
and Trus
t
The
patie
nts
ge
tt
ing
treat
ed
in
the
healt
hca
r
e
organ
iz
at
io
ns
are
al
so
a
pa
rt
of
the
syst
e
m
and
ha
ve
their
own
inte
rf
ace
to
lo
gin
and
us
e
the
syst
e
m
.
The
patie
nts
have
the
pr
i
vileges
of
vi
ewing
thei
r
he
al
th
record
file
s
an
d
m
os
t
i
m
po
rtantl
y
pr
ovi
de
t
he
hos
pital
s
us
ing
the
RB
AC
syst
e
m
per
m
i
ssion
to
acce
s
s
their
record
s.
T
he
pa
ti
ent
m
ay
al
so
choose
t
o
deny
gr
a
nting
a
cc
ess
rig
hts
to
t
he
hosp
it
al
as
pe
r
their
prefe
re
nce.
In
instances
w
he
re
patie
nts
ha
ve
been
prov
i
ded
ina
de
qu
at
e
care,
it
is
s
om
eti
m
es
h
owever,
im
pr
act
ic
al
to
disre
gard t
he m
erit
s o
f
t
he h
eal
thcare
orga
ni
zat
ion
due
to m
ishaps
a
nd in
com
petency of a f
e
w
em
plo
ye
es.
In
orde
r
to
pr
e
ven
t
t
he
cre
dibi
li
t
y
of
a
n
org
anizat
ion
from
getti
ng
l
ow
e
r
ed
as
a
w
ho
le
,
the
patie
nt
s
are
al
so
gi
ven
t
he
pri
vilege
to p
r
ovide
fee
dba
ck
to
the
em
pl
oyees
w
ho
h
av
e
treat
ed
them
wh
ic
h
will
be
store
d
in
the
form
of
a
trust
recor
d.
The
tr
us
t
recor
d
of
a
n
em
ploy
ee
will
be
sto
red
i
n
the
f
or
m
of
<X
rc
,
X
tr
>
wh
e
re
X
rc
denotes
t
he
co
unt
of
t
he
t
otal
num
ber
of
trust
rec
ords
of
the
em
plo
ye
e
an
d
X
tr
denot
es
the
t
otal
val
ue
of
the
tru
st
rec
ords
prov
i
ded
by
the
patie
nts
for
the
em
ploy
ees
.
Af
te
r
ev
al
uating
t
he
to
ta
l
trust
value
of
t
he
e
m
plo
ye
e
from
his
tr
us
t
tu
ple,
the
m
ean
valu
e
is
cal
culat
ed.
It
is
the
a
utho
rity
of
the
de
pa
rtm
ent
to
d
et
erm
ine
a
trust
th
res
ho
l
d
val
ue
f
or
it
s
e
m
plo
ye
es.
I
f
the
m
ean
trust v
al
ue
of
t
he
e
m
plo
ye
e
is
abo
ve
this
th
res
ho
l
d
lim
it
,
then
he
or
sh
e
is
con
si
der
e
d
t
ru
st
worthy
a
nd
can
gain
acce
s
s
to
the
patie
nt
’s
m
edical
reco
r
ds
.
H
ow
e
ve
r
,
if
the
m
ean
trust
value
is
lo
wer
tha
n
that
of
the
t
hr
es
hold,
the
s
yst
e
m
wil
l
ensu
re
that
su
c
h
e
m
plo
ye
es
are
den
ie
d
acce
ss
ri
gh
ts
to
patie
nt’s
m
e
dical
rec
ords.
This
featu
re
w
il
l
no
t
on
ly
e
nsure
pri
vacy
of
patie
nt
data
bu
t
can
al
so
be used
as
a m
et
ric to eval
uate the
patie
nt r
el
at
io
nshi
p m
anag
em
ent of the
em
plo
ye
e.
3.
RESEA
R
CH MET
HO
D
In this sect
io
n,
fitness a
nd m
utati
on
functi
ons
are discu
ssed
with
resp
ect
t
o R
BAC sy
ste
m
.
3.1. Sys
tem
O
verv
ie
w
an
d
P
rocess
Wor
kf
l
ow
The
m
od
el
des
ign
e
d
has
bee
n
i
m
ple
m
ented
in
Java
us
in
g
NetB
eans
I
DE
and
Derby
da
ta
base.
T
he
GUI
of
the
RB
AC
syst
em
has
been
de
velo
pe
d
us
i
ng
Java
S
erv
e
r
Pa
ges
(
J
SP)
.
The
us
e
of
ser
vlets
has
e
ns
ure
d
a
dynam
ic
syst
e
m
wh
e
re
a
ny
cha
nges
a
nd
updates
m
ade
by
the
us
e
r
a
r
e
ref
le
ct
e
d
im
m
ediat
el
y
in
the
GUI.
The
process
w
orkf
l
ow
can
be
su
m
m
arized
from
the
fo
ll
owi
ng
ps
e
udoc
ode
.
Th
e
fitne
ss
a
nd
m
utati
on
f
unct
ion
of the a
bove
algorit
hm
are
m
e
ntion
e
d
i
n
sect
i
on
s
3.2 a
nd 3.3 res
pecti
vely
.
a.
Enter E
m
plo
ye
e I
D
(i.e
. AB
-
CD
-
EF
-
GH) a
nd Pass
w
ord
b.
If
(cr
e
de
ntial
s ar
e fit)
c.
L
og
i
n
S
ucc
essfu
l
d.
I
f (sta
rtin
g of ne
w wee
k)
e.
C’
D’ =
m
uta
te
(CD)
f.
fetchTas
ks
(C
’D’)
g.
Work
i
ng_Depa
rtm
ent = C’D
’
h.
Else
i.
fetchTas
ks
(
Wor
king
_Depar
tm
ent)
j.
En
d If
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Tru
st E
nh
an
ce
d
R
ole B
as
e
d
A
ccess C
ontrol
Using
Genet
ic
Algo
rit
hm
(
Sa
l
eh
M
owla
)
4731
3.2. Sel
ectio
n
an
d
Fitne
ss F
unct
i
on
The
fitness
f
un
ct
ion
of
the
al
gori
thm
will
evaluate
the
validit
y
of
the
us
er’s
inp
ut.
It
will
validat
e
the
log
in
of t
he us
er
based o
n
t
he
foll
ow
i
ng crit
eria:
a.
The
le
ng
t
h of h
is use
r
I
D
is
8.
b.
The H
os
pital
t
he user
wo
rk
s
in
e
xists in t
he data
base
.
c.
The De
par
tm
e
nt ex
ist
s i
n
th
e
database
for
th
e orga
nizat
ion.
d.
The
R
ole is ac
counted
for i
n
t
he data
base
.
e.
The use
r has
be
en registe
re
d
i
n
the
or
gan
iz
at
ion
.
If
the
a
bove
cr
it
eria
are
m
et
s
at
isfact
or
il
y,
th
e
us
er
is
co
ns
i
der
e
d
to
be
fit
and
t
he
al
gorithm
will
pr
ocee
d
wit
h
assigni
ng the
pe
rm
issi
on
s
to t
he user
acco
r
din
g t
o his
ro
le
.
3.3. Mu
t
at
io
n
The
ge
netic
al
gorithm
will
ensure
t
hat
the
ro
le
a
nd
ho
s
pit
al
of
a
us
er
do
es
not
c
hange
because
in
a
pr
act
ic
al
scen
a
rio,
it
is im
plausib
le
for
a
nu
rs
e to
hav
e
the
pe
rm
issi
on
s o
f
a
r
esi
de
nt
do
ct
or or
for
a
n
em
plo
ye
e
work
i
ng
in
one
orga
nizat
ion
get
acce
ss
to
r
eso
ur
ces
of
a
nothe
r.
Keep
i
ng
the
r
ole
an
d
work
i
ng
orga
ni
zat
ion
sam
e,
the
al
gorithm
will
m
ut
at
e
dig
it
s
C
D.
Since
t
he
m
utati
on
will
de
pe
nd
on
t
he
e
xist
ing
i
nfrastr
uct
ur
e
of
the
orga
nizat
io
n,
the
m
utati
on
will
al
ways
be
vali
d;
this
ens
ur
es
t
hat
th
e
al
gorithm
is
no
t
a
pp
li
e
d
al
l
ov
e
r
again
a
nd th
us
saves o
n
ti
m
e a
nd inc
reases
pe
rfor
m
ance.
Anothe
r
facto
r
that
has
been
ta
ken
int
o
c
onside
rati
on
is
the
fact
t
hat
i
t
is
not
feasi
bl
e
for
t
he
al
gorithm
to
m
utate
t
he
de
pa
r
t
m
ent
ever
y
ti
m
e
the
e
m
plo
ye
e
log
s
in.
If
th
is
is
al
lowed,
t
hen
it
would
be
com
e
te
dio
us
a
nd
al
m
os
t
i
m
po
ssible
to
get
us
ed
to
t
he
w
ork
culture
of
t
he
healt
h
orga
niz
at
ion
i
n
wh
ic
h
he
is
work
i
ng
in
sin
ce
dif
fer
e
nt
de
par
tm
ents
ha
ve
dif
fer
e
nt
poli
ci
es.
I
n
view
of
this
pro
ble
m
,
the
i
m
ple
m
ented
m
od
el
m
utate
s
the
de
par
tm
ent
of
t
he
em
plo
ye
e
on
ce
in
a
w
eek,
a
poli
cy
wh
ic
h
ca
n
be
ch
ang
e
d
easi
ly
as
well
.
This e
nsures
th
at
the alg
or
it
hm
w
on
’t m
utate
the
dep
a
rtm
e
nt un
necessa
rily
f
urt
he
r
inc
re
asi
ng ef
fici
enc
y.
3
.
4.
T
as
k
a
ll
oc
at
i
on
On
ce
the
al
go
r
it
h
m
has
m
utated
the
de
par
tm
ent
cred
e
ntial
s
in
the
us
er
I
D
,
it
will
need
to
fetch
the
ta
sk
s
that
the
e
m
plo
ye
e
needs
to
perform
on
that
par
ti
c
ular
day.
.
D
epe
nd
i
ng
on
t
he
work
i
ng
orga
ni
zat
ion,
m
uta
te
d
de
par
t
m
ent an
d ro
le
of
t
he
us
e
r,
t
he
algorit
hm
w
il
l
d
et
erm
ine the tasks
that t
he
e
m
plo
ye
e w
il
l hav
e to
perform
an
d
t
he
r
es
ources
he c
an get ac
cess
to.
T
he
al
gorithm
n
eeds t
o
ta
ke
in
t
o
acc
ount
two co
ns
i
der
at
ion
s
-
1.
Ever
y
de
par
tm
ent h
a
s m
any em
plo
ye
es.
2.
Ever
y
r
ole h
as
been dele
g
at
ed
m
any p
erm
issio
ns a
nd fun
ct
i
on
al
it
ie
s.
It
w
ould b
e ph
ysi
cal
ly
i
m
po
ssible
f
or
a
si
ngle
e
m
plo
ye
e
to
pe
rfor
m
al
l
the
duti
es
an
d
ta
sk
m
app
e
d
to
his
r
ole.
T
here
fore,
w
hile
fetchin
g
the
ta
s
ks
the
al
gorithm
will
ensure
th
a
t
each
em
plo
ye
e
will
be
al
lo
cat
ed
no
t
m
or
e
tha
n
3
ta
sk
s
eac
h
da
y
(polic
y
su
bj
ect
to
change
a
ccordin
g
to
t
he
orga
nizat
ion).
The
al
gorit
hm
thu
s
ens
ur
es
t
hat
e
m
plo
ye
es
are
no
t
over
bur
dened
a
nd
due
t
o
t
he
a
uto
m
at
ed
m
echan
ism
,
it
reduces
t
he
burd
e
n
of
the ad
m
inist
rati
ve
hea
d o
f
e
ve
ry d
e
par
tm
ent.
3.5.
Tr
ust Fac
to
r
Wh
e
n
a
patie
nt
logs
into
t
he
syst
em
,
he
or
s
he
has
t
he
opti
on
of
pro
vid
in
g
f
eed
back
t
o
th
e
e
m
plo
ye
es
bel
onging
t
o
t
he
dep
a
rtm
ent
that
is
ta
king
ca
re
of
the
patie
nt
from
a
range
of
-
1
to
+
1
w
he
re
-
1
denotes
untr
ust
worthy
an
d
+1
de
note
s
t
ru
stw
or
t
hy.
Th
e
i
m
ple
m
entation
ca
n
be
s
umm
arized
from
the
ps
e
udoc
od
e
shown
belo
w.
Pati
ent:
1.
x
=
getPati
entF
eedb
ac
k(Em
plo
ye
e_
ID)
2.
If(x >
0)
3.
In
c
rem
ent coun
t
of
X
rc
4.
In
c
rem
ent coun
t
of
X
tr
in
da
ta
base
5.
Else
I
f
(
x
<
0)
6.
In
c
rem
ent coun
t
of
X
rc
7.
Decr
em
ent co
unt
of X
tr
8.
Else
9.
In
c
rem
ent coun
t
of
X
rc
10.
En
d
I
f
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Em
plo
ye
e:
1.
nu
m
Re
cor
ds =
fetchT
ru
stR
ec
ordCou
nt(Em
plo
ye
e_ID)
2.
trustVal
ue
=
fe
tc
hTrustVal
ues
(Em
plo
ye
e_ID
)
3.
m
eanTr
ust
= tr
us
tVal
ue
/
nu
m
Re
cords
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
8
, N
o.
6
,
Dece
m
ber
201
8
:
4724
-
4734
4732
4.
If(m
eanTr
us
t
>
de
par
tm
entTru
stTh
res
ho
l
d)
5.
Pati
ent
Data
Access
Grante
d
6.
Else
7.
Pati
ent
Data
Access
De
nied
8.
En
d
I
f
4.
RESU
LT
S
AND A
N
ALYSIS
The
syst
em
has
been
de
sig
ned
to
ta
ke
i
nto
co
ns
i
der
at
ion
the
fact
that
each
an
d
ever
y
healt
h
dep
a
rtm
ent
wil
l
hav
e
their o
w
n
poli
ci
es
and
g
ui
delines
that need
t
o
be
im
ple
m
ented
and
foll
ow
e
d.
T
he
m
od
el
factors
in
t
he
e
xp
e
rience
of
th
e
em
plo
ye
e
with
res
pect
to
hi
s
or
he
r
ro
le
.
F
or
e
xam
ple,
it
m
ay
be
require
d
f
or
an
inter
n
w
or
king
in
the
G
ener
al
S
urge
ry
Dep
a
rtm
ent
t
o
ha
ve
at
le
ast
4
-
6
wee
ks
of
ex
per
ie
nce
to
ge
t
per
m
it
te
d
to
pe
rfor
m
a
ta
sk
bu
t
that
require
d
by
an
i
nter
n
w
orkin
g
in
the
N
eurolo
gy
De
pa
rtm
ent
m
a
y
be
8
-
10
weeks
f
or
the
sam
e
ta
sk
.
Th
e
syst
e
m
design
has
acc
omm
od
at
e
d
that
ea
ch
an
d
eve
ry
dep
a
rtm
ent
will
hav
e
their
own p
olici
es sp
eci
fic t
o
t
he diffe
re
nt rol
es wor
king i
n
t
he depa
rtm
ent.
The
e
xperie
nc
e
m
entioned
by
a
perso
n
e
ntit
y
work
i
ng
in
t
he
orga
nizat
ion
ref
e
rs
t
o
th
e
w
or
k
exp
e
rience
of
the
entit
y
in
a
par
ti
cula
r
de
pa
rtm
ent
and
no
t
the
total
nu
m
ber
of
days
th
at
the
em
plo
ye
e
has
worked
i
n
the
orga
nizat
ion
.
Figure
10
sho
ws
a
sam
ple
scenari
o
of
departm
ent
po
li
ci
es
w
her
e
t
he
X
-
a
xis
represe
nt
the
nu
m
ber
of
we
e
ks
the
em
plo
ye
e
has
work
e
d
in
eac
h
de
pa
rtm
ent
and
Y
-
axis
represe
nts
th
e
nu
m
ber
of
ta
s
ks
an
d
operati
ons
the
em
plo
ye
e
has
been
pe
rm
i
tt
ed
to
per
f
or
m
as
sh
own
in
the
Fig
ure
10.
I
n
a
scenari
o
wh
e
re
patie
nts
a
re
not
com
fo
rta
ble
an
d
do
not
tr
us
t
a
n
em
plo
ye
e,
they
ca
n
ra
te
the
em
plo
ye
e
an
d
giv
e
thei
r
fee
dback
.
Ba
sed
on
the
gu
i
delin
es
an
d
poli
ci
es
of
th
e
de
par
t
m
ent,
if
an
e
m
plo
ye
e
is
con
side
red
un
t
ru
st
worthy t
hen h
e
w
il
l b
e
den
ie
d
acce
ss
t
o
a
ny p
at
ie
nt
re
cords.
Figure
10. A
S
a
m
ple Scen
a
rio of De
par
tm
e
nt P
olici
e
s
In
a
dd
it
io
n
to
the
ab
ov
e
,
the
m
od
el
assume
s
that
an
em
plo
ye
e
work
i
ng
in
a
par
ti
cular
dep
a
rtm
ent
can
on
ly
acce
s
s
rec
ords
of
pa
ti
ents
belo
ngin
g
to
that
de
partm
ent.
A
patie
nt
can
not
de
ci
de
wh
ic
h
dep
a
rtm
ent
gets
to
treat
him
since
it
is
the
assum
ption
that
the
do
ct
or
s
would
be
m
or
e
inform
ed
abo
ut
that
decisi
on.
I
n
case
the
doct
or
feels
that
t
he
patie
nt
shou
l
d
be
treat
ed
by
a
n
em
plo
ye
e
bel
onging
to
a
nother
healt
h
dep
a
rtm
ent,
he
can
aut
horize
that
departm
ent
to
gain
acce
s
s
to
the
patie
nt’s
rec
ords
.
F
or
exam
ple,
a
fter
the
delivery
of
a
bab
y
a
nd
i
niti
al
treatm
ent
of
the
m
oth
er,
the
Gynec
olog
y
dep
a
rtm
ent
m
ay
reco
m
m
e
nd
t
he
m
oth
er
to
see
k
f
ur
the
r
t
reatm
ent,
at
te
ntio
n
a
nd
care
f
ro
m
a
pe
diatri
ci
an.
W
it
h
t
he
help
of
the
im
ple
m
ented
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Tru
st E
nh
an
ce
d
R
ole B
as
e
d
A
ccess C
ontrol
Using
Genet
ic
Algo
rit
hm
(
Sa
l
eh
M
owla
)
4733
m
od
el
,
the
G
ynecolo
gy
de
pa
rtm
ent
can
aut
horize
the
P
ediat
rics
de
partm
ent
to
gain
acce
ss
to
the
sai
d
patie
nt’s
a
nd
ba
by’s
m
edical
r
eco
rds.
5.
CONCL
US
I
O
N
Fo
r
the
pur
po
se
of
th
e
devel
op
in
g
an
RB
AC
syst
em
for
healt
hcar
e
orga
nizat
ions
,
the
ge
netic
al
gorithm
had
been
m
od
ifie
d
to
i
nclu
de
only
sel
ect
ion
a
nd
m
utati
on
.
T
he
need
f
or
c
r
os
s
ov
e
r
was
not
felt
since
it
w
ould
resu
lt
in
the
pr
oductio
n
of
ne
w
offsprin
g
(i.
e
.
em
plo
ye
e
entit
ie
s)
w
hich
m
ay
no
t
e
xist
in
th
e
database
.
S
uc
h
entit
ie
s
w
ou
l
d
be
c
onside
re
d
unfit
an
d
t
he
ge
netic
al
gorith
m
wo
uld
h
a
ve
to
re
-
com
pu
te
a
valid
so
luti
on in or
de
r
f
or
t
he
syst
em
to
fetch and a
ll
ocate t
he
ta
sk
s to
t
he
em
pl
oyee. T
his r
e
dunda
nt co
m
pu
t
at
ion
is
avo
i
ded
t
her
e
by
m
aking
the
s
yst
e
m
faster
and
m
or
e
ef
fici
ent
(sim
i
la
r
to
the
obj
ect
iv
e
of
re
du
ci
ng
ove
rh
ea
d
com
pu
ta
ti
on
ac
hieve
d by
Me
ne
ka
a
nd Mee
na
ks
his
unda
ram
[
22
]
)
.
The
m
od
el
i
m
plem
ented
can
be
us
ed
by
he
al
thcare
orga
nizat
ion
s
w
her
e
e
m
plo
ye
es
are
trai
ned
an
d
ta
ught
in
dif
fe
ren
t
fiel
ds
of
t
he
organ
iz
at
io
n.
T
he
m
od
el
al
so
ta
kes
i
nto
acco
un
t
t
he
possibil
it
y
of
di
ff
e
ren
t
trust
poli
ci
es
and
e
xp
e
rience r
eq
uirem
ents
by
diff
ere
nt
de
pa
rtm
ents
fo
r
the
e
m
plo
ye
e
to
gain
acce
ss
to certai
n
resou
rces
or
pe
rfor
m
certai
n
op
e
rati
ons
an
d
ta
sk
s.
T
he
obje
ct
ive
of
de
velop
i
ng
a
n
a
utom
at
ed
syst
e
m
wh
e
re
e
m
plo
ye
es
are
al
locat
ed
ta
s
ks
acc
ordin
g
to
their
r
ole
and
ex
pe
rienc
e
was
su
cce
ss
fu
ll
y
achie
ved.
T
he
integrati
on
of
the
trust
fact
or
has
en
sured
t
hat
co
nf
i
den
ti
a
l
pati
ent
data
is
safe
f
ro
m
the
hands
of
po
t
entia
l
m
al
ic
iou
s
us
e
r
s.
F
uture
wor
k
with
resp
ect
to
the
RB
A
C
m
od
el
wou
ld
be
to
im
ple
m
ent
crypto
grap
hic
al
gorithm
s
and
integ
rate
it
w
it
h
the
syst
em
to
guara
ntee
entit
y
authe
ntica
ti
on
a
nd
th
us
f
ur
t
her
incre
ase
th
e
secur
i
ty.
REFERE
NCE
S
[1]
R.
Sandhu,
E
.
C
o
y
ne
,
H
.
Feinst
e
in,
and
C
.
Youm
an,
“
Role
-
base
d
ac
c
ess
cont
ro
l
m
odel
s,”
Com
puter,
vol
.
29
,
no
.
2
,
Feb
1996.
[2]
Sastr
y
K.
,
Gol
dber
g
D.,
K
en
dal
l
G.
(2005)
Gene
tic
Algor
it
hm
s.
In:
Burk
e
E.
K
.
,
Kend
all
G.
(ed
s)
Sea
r
ch
Methodol
ogie
s
.
Springer,
Boston
,
MA
[3]
A.
Ferre
ir
a
et
al.
,
"H
ow
to
Secur
ely
Bre
ak
int
o
R
BAC:
The
BTG
-
RBAC
Model,
"
2009
Annual
Com
pute
r
Secur
i
t
y
Applic
a
ti
ons Co
nfe
ren
c
e, Honol
ulu,
HI
,
2009
,
p
p.
23
-
31
,
doi
:
10
.
1109/ACSA
C.
2009.
12
[4]
V.
Bindi
gana
v
ale
and
J.
Ouy
ang
,
"Role
Based
Acc
ess
Control
in
Ent
erp
rise
Appl
ic
a
ti
on
-
Secur
ity
Adm
ini
strat
io
n
and
Us
er
Man
a
gement",
2006
IEE
E
Inte
rn
atio
nal
Conf
ere
n
ce
on
Inform
at
ion
Reuse
&
Int
e
gra
ti
on
,
W
ai
ko
l
oa
Vill
ag
e, HI,
200
6,
pp
.
111
-
116
,
doi:
10
.
1109/IRI
.
2006.
252397
[5]
D.
R.
Kuhn,
E
.
J.
Co
y
n
e,
and
T
.
R.
W
ei
l,
“
Addin
g
at
tri
bu
te
s
to
ro
le
-
base
d
acce
ss
cont
rol
,
”
Com
pute
r,
vo
l.
43
,
no.
6,
pp.
79
–
81
,
Jun.
2010.
[6]
Alshehri
and
R.
Raj
,
“
Secur
e
Acc
ess
Control
for
Hea
lt
h
In
for
m
at
ion
Sharing
S
y
stems
,
”
in
I
E
EE
Int
ern
ationa
l
Confer
ence
on
Hea
lt
h
c
ar
e
Infor
m
at
ic
s (ICHI 20
13),
Phil
ade
lph
i
a,
2013
.
[7]
R.
W
onohoesodo
and
Z.
Ta
ri
,
"A
role
base
d
ac
ce
ss
cont
rol
fo
r
W
eb
servic
es,
"
IEE
E
Inte
rna
t
iona
l
Confer
ence
onServic
es
Com
puti
ng,
2004.
(SCC
2004).
Pro
ceedi
ngs.
2004
,
20
04,
pp
.
49
-
56
.
d
oi:
10
.
1109/SCC.2004.
13
57989
[8]
C.
Santos
-
Pere
ir
a,
A.
B.
Augus
to,
R.
Cruz
-
Corre
i
a
and
M.
E.
Corr
ei
a
,
"A
sec
ure
RBAC
m
obil
e
age
nt
ac
c
ess
cont
ro
l
m
odel
for
hea
lthcar
e
inst
it
uti
on
s,"
Proce
edi
ngs
of
the
26th
IEE
E
Inte
rn
at
ion
al
Sy
m
posium
on
Com
pute
r
-
Based
Medic
a
l
S
y
s
te
m
s,
Porto,
2013,
p
p.
349
-
354
,
doi: 10.
1109/CBMS
.
2013.
6627814
[9]
S.
Alshehri,
S.
Mishra
and
R.
K.
Raj,
"U
sing
Acc
ess
Control
to
Miti
g
at
e
Insi
der
Thr
ea
ts
to
Hea
lt
h
ca
r
e
S
y
st
ems
,
"
2016
IEE
E
Int
ern
ational
Conf
ere
nc
e
on
He
althca
r
e
Inform
at
i
cs
(ICHI),
Chi
ca
go,
IL,
2016,
pp.
55
-
60,
do
i:
10.
1109/ICHI.
2
016.
11
[10]
M.
F.
F.
Khan
and
K.
Sakamura,
"A
sm
art
ca
rd
-
base
d
fra
m
ework
for
del
egation
m
ana
gement
in
hea
lt
h
ca
r
e
Acc
ess
Control
s
y
stem
s,"
2016
IEE
E
Re
gion
10
Confe
renc
e
(
TE
NCON
)
,
Singapore
,
2016,
pp.
2739
-
2742,
doi
:
10.
1109/TENCO
N.2016.
78485
38
[11]
R.
W
oote
n,
R.
Klink,
F.
Sin
ek,
Y.
Bai
and
M.
S
har
m
a,
"D
esign
and
Im
ple
m
ent
a
t
ion
of
a
Se
cur
e
Hea
lt
h
ca
r
e
Soci
al
Cloud
S
y
stem,"
2012
12th
IEEE/ACM
Inte
rna
t
iona
l
S
y
m
posiu
m
on
Cluste
r,
C
loud
and
Grid
Com
puti
ng
(cc
g
rid
2012),
Ott
awa
,
ON
,
2012,
pp
.
8
05
-
810,
d
oi
:
10
.
1109/CCGrid.
20
12.
131
[12]
L.
Zh
ou,
V.
Var
adha
ra
ja
n
and
M
.
Hitchens,
"T
ru
st
Enha
nc
ed
Cr
yptogra
phi
c
Rol
e
-
Based
Acc
ess
Control
for
Se
cur
e
Cloud
Data
Stor
age
,
"
in
I
EE
E
T
ran
sac
t
ions
on
I
nform
at
ion
Fore
nsics
and
Se
cur
i
t
y
,
vo
l.
10
,
no
.
1
1,
pp.
2381
-
239
5,
Nov.
2015,
doi:
10.
1109/T
IFS
.
2
015.
2455952
[13]
S.
Yu,
C.
W
ang,
K.
Ren
and
W
.
Lou,
"A
chi
ev
ing
Secur
e,
Sc
al
ab
l
e,
and
Fine
-
gra
i
ned
Data
Ac
ce
ss
Control
in
Clou
d
Com
puti
ng,
"
2010
Proce
ed
ings
IEE
E
INF
OCOM,
S
an
Diego,
CA,
2010,
pp.
1
-
9,
doi:
10.
1109/INFCO
M.2010.
546217
4
[14]
V.
Koufi,
F.
M
al
amat
eni
ou
and
G.
Vass
il
ac
opo
ulos,
"U
biqui
tou
s
ac
ce
ss
to
cl
ou
d
emerge
nc
y
m
edi
c
al
servi
ce
s,"
Proce
edi
ngs
of
the
10th
IEEE
Inte
rna
ti
on
al
Confer
ence
on
Inform
at
ion
Te
chno
log
y
an
d
Applic
ations
in
Biom
edi
ci
n
e, Co
rfu,
2010
,
pp
.
1
-
4,
doi
:
10
.
1109/I
TAB.
2010.
5687
702
[15]
X.
Guo,
J.
Zheng,
Q.
Zha
ng
,
H.
Li
u.
“
Role
-
b
ase
d
Trust
Man
age
m
ent
Model
in
Multi
-
dom
ain
Envi
ronm
ent
”
.
Indone
sian J
our
nal
of
Elec
tric
al
Engi
ne
ering
and
Computer
Sc
ie
n
ce
.
2013,
Vol.
1
1,
No.
1.
Evaluation Warning : The document was created with Spire.PDF for Python.