An Extended Consent-Based Access Control Framework: Pre-Commit Validation and Emergency Access

This paper proposes an extended Consent-Based Access Control framework that enhances patient autonomy and system performance by shifting conflict resolution to a pre-commit validation phase, formalizing immutable access invariants, and implementing a context-aware emergency mechanism that balances clinical continuity with strict data privacy.

Nasif Muslim, Jean-Charles Grégoire

Published Tue, 10 Ma
📖 5 min read🧠 Deep dive

Imagine you are the owner of a very important, sensitive diary (your medical records). You want to control who can read it. Maybe you want your family doctor to see everything, but you want to keep a specific embarrassing note hidden from your insurance company.

This is the world of Consent-Based Access Control (CBAC). It's the digital system that lets patients say, "Yes, you can see this," or "No, you can't see that."

However, the current systems used in hospitals are a bit like a chaotic traffic intersection with no traffic lights. They wait until a doctor actually tries to open your file to figure out if they are allowed. If you have given conflicting instructions (e.g., "Allow Dr. Smith" but also "Deny Dr. Smith"), the system has to make a split-second decision right then and there. This is slow, confusing, and sometimes leads to mistakes where the wrong person sees the wrong thing.

This paper proposes a smarter, safer way to manage your medical diary. Here is how it works, broken down into three simple concepts:

1. The "Pre-Flight Check" (Pre-Commit Validation)

The Problem: In the old system, you could write down two contradictory rules in your diary's instructions. The system wouldn't notice until a doctor tried to read the file, causing a traffic jam at that exact moment.

The New Solution: Think of this new framework as a strict editor who checks your instructions before they are ever published.

  • The Analogy: Imagine you are filling out a form to join a club. In the old way, you could write "I want to enter the VIP room" and "I want to be banned from the VIP room" on the same piece of paper. The bouncer would only figure out the contradiction when you actually showed up at the door, causing a fight.
  • In this paper: Before your consent rules are saved to the system, a special module (called the CCAM) acts as that editor. It looks at your new rules and says, "Wait, this contradicts what you already said," or "You can't ban the person who wrote this note." It fixes or rejects the rule before it becomes active.
  • The Result: When a doctor finally asks for your file, the system doesn't have to stop and think. The rules are already clean, clear, and conflict-free. It's like having a pre-approved itinerary; the trip runs smoothly because the plan was checked in advance.

2. The "Unbreakable Safety Net" (System Invariants)

The Problem: Sometimes, patients get confused or angry and accidentally write rules that lock everyone out, including the doctor who wrote the note or the patient themselves. This could be dangerous if a doctor needs to see their own work or if a patient needs to see their own history during an emergency.

The New Solution: The paper introduces Immutable System Invariants.

  • The Analogy: Think of these as the foundation of a house. You can paint the walls any color you want (change your consent rules), and you can rearrange the furniture (add new rules), but you cannot knock down the foundation.
  • In this paper: The system has two unchangeable rules:
    1. The doctor who created a medical note always has access to it.
    2. The patient always has access to their own notes.
  • The Result: No matter how many "No Entry" signs a patient puts up, the system guarantees that the creator and the owner can always get in. This ensures that clinical care never stops, even if the patient makes a mistake in their settings.

3. The "Emergency Break-Glass" with a Filter

The Problem: What if a patient is unconscious and a doctor needs to see their records to save their life? In the old system, the doctor might be blocked by a "No Access" rule, or they might have to break the glass and see everything (including unrelated, private info), which is a privacy nightmare.

The New Solution: A Context-Aware Emergency Override.

  • The Analogy: Imagine a smart fire alarm. In the old days, if you pulled the fire alarm, the whole building's doors unlocked, and everyone could run into every room, even the ones they shouldn't.
  • In this paper: The new system is like a smart fire alarm connected to a camera.
    1. The Trigger: The doctor connects a medical device (like a heart monitor) to the system. The device proves the patient is in a real emergency (e.g., a heart attack).
    2. The Filter: The system doesn't just unlock everything. It looks at the heart monitor and asks, "What kind of emergency is this?" If it's a heart attack, it only unlocks the "Cardiac" and "Emergency Room" files. It keeps the "Dental History" or "Psychiatric Notes" locked.
    3. The Key: The doctor gets a temporary, digital "Emergency Key" (an EOT) that only opens the specific rooms needed for that specific emergency.
  • The Result: The patient gets life-saving care immediately, but their private, unrelated secrets remain safe. The system prunes away 80-90% of the data that isn't needed for the emergency.

Summary: Why This Matters

This paper suggests moving the "thinking" part of security from the moment of access (when a doctor is rushing to save a life) to the moment of creation (when a patient is calmly setting up their rules).

  • Old Way: "I'll figure out if this is allowed when you ask." (Slow, risky, confusing).
  • New Way: "I checked your rules yesterday. They are perfect. Here is your access." (Fast, safe, predictable).

By cleaning up the rules before they are used, and by having a smart, filtered emergency key, this framework protects patient privacy without slowing down life-saving medical care.