Trust Establishment in Emergency Case

  • Laurent Gomez
  • Ulrich Jansen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3986)


Access to medical information, e.g. current medication, blood group, and allergies, is often vital, especially in case of emergency. An emergency physician has to know medication incompatibilities and to access to the patient’s treatment history. It raises the issue of patient’s privacy. Thus a patient grants access to his medical information to his physician because he has a pre-established trust relationship with this physician. But he wants to prevent any other physician to gain access to his medical information. In emergency case, due to the patient’s unconsciousness, it is difficult to establish a trust relationship between patient and emergency physician. In our demonstration, we show how to exploit context information to address the problem of granting access to medical information without a pre-established trust relationship between an emergency physician and a patient.


Access Control Context Information Emergency Physician Trust Relationship Access Control Policy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    IST Project FP6 IST-1-508015: (Knowledge Sharing and Decision Support for Healthcare Professionals (DOC HAND))Google Scholar
  2. 2.
    IST Project FP6 IST-1-507760: (A Diagnosis Collaborative Environment for Medical relevant Situations (DICOEMS))Google Scholar
  3. 3.
    Bundesministerium fur Gesundheit: (Die gesundheitskarte.)Google Scholar
  4. 4.
    IST Project FP6 - IST-004636: MOSQUITO - Mobile Workers secure business applications in ubiquitous environment (2004)Google Scholar
  5. 5.
    Al-Muhtadi, J., Ranganathan, A., Mickunas, R.C., Cerberus, M.D.: A context-aware security scheme for smart spaces (2003)Google Scholar
  6. 6.
    Wullems Chris, M.L., Clark, A.: Toward context-aware security: an authorization architecture for intranet environments (2004)Google Scholar
  7. 7.
    Michael, J., Fogla, Z.Z.C.P., Ahamad, M.: A context-aware security architecture for emerging applications. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), Las Vegas, Nevada, USA (2002)Google Scholar
  8. 8.
    Siltanet: (wLogin)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Laurent Gomez
    • 1
  • Ulrich Jansen
    • 1
  1. 1.SAP Corporate Research – SAP Lab FranceMouginsFrance

Personalised recommendations