Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Solomon Berhe is active.

Publication


Featured researches published by Solomon Berhe.


bioinformatics and biomedicine | 2012

A security framework for XML schemas and documents for healthcare

Alberto De la Rosa Algarín; Steven A. Demurjian; Solomon Berhe; Jaime A. Pavlich-Mariscal

The extensible Markup Language (XML) has wide usage in healthcare to facilitate health information exchange via the Continuity of Care Record (CCR) for storing/managing patient data, diagnoses, medical notes, tests, scans, etc. Health IT products like electronic health record (EHR, e.g., GE Centricity) and personal health record (PHR, e.g., MS Health Vault) use CCR for data representation. To manage patient data in CCR, security as governed by HTPAA must be attained when using XML and its technologies (XACML, XSLT, etc.). Our objective is to have an XML document (CCR instance) appear differently to authorized users at different times based on a users role, constraints, separation of duty, delegation of authority, etc. In this paper, we propose a security framework that targets XML schémas and documents, in general, and CCR schémas and documents, in particular with control capabilities that achieve customizable access to an XML documents elements by applying secure software engineering methodologies and defining new UML XML-focused diagrams for schémas and permissions. This allows us to generate XACML policies, and enforce security at the runtime level on XML instances to insure that correct and required patient data is securely delivered. In a market of rapidly emerging mobile healthcare applications to allow patients to manage their own data (PHRs) and for self-management of chronic diseases, the need for secure access to information and its authorization and transmission to providers (and EHRs) will be critical.


Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII | 2009

Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC

Solomon Berhe; Steven A. Demurjian; Thomas Agresta

In the next 10 years there will be rapid adoption of health information technology - electronic medical records by providers and personal health records by patients - linked via health information exchange. There is an emergent need to provide secure access to information spread across multiple repositories for health care providers (e.g., physicians, nurses, home health aides, etc.) who collaborate with one another across cyberspace to deliver patient care. Are available security models capable of supporting collaborative access where providers are simultaneously modifying a patients medical record? To address this question, this paper details collaborative security extensions to NIST RBAC.


DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy | 2011

Leveraging UML for security engineering and enforcement in a collaboration on duty and adaptive workflow model that extends NIST RBAC

Solomon Berhe; Steven A. Demurjian; Swapna S. Gokhale; Jaime A. Pavlich-Mariscal; Rishi Kanth Saripalle

To facilitate collaboration in the patient-centered medical home (PCMH), our prior work extended the NIST role-based access control (RBAC) model to yield a formal collaboration on duty and adaptive workflow (COD/AWF) model. The next logical step is to place this work into the context of an integrated software process for security engineering from design through enforcement. Towards this goal, we promote a secure software engineering process that leverages an extended unified modeling language (UML) to visualize COD/AWF policies to achieve a solution that separates concerns while still providing the means to securely engineer dynamic collaborations for applications such as the PCMH. Once defined, these collaboration UML diagrams can be utilized to generate the corresponding aspect oriented policy code upon which the enforcement mechanism can be applied to at runtime.


International Journal of Secure Software Engineering | 2010

Integrating Access Control into UML for Secure Software Modeling and Analysis

Thuong Doan; Steven A. Demurjian; Laurent Michel; Solomon Berhe

Access control models are often an orthogonal activity when designing, implementing, and deploying software applications. Role-based access control RBAC which targets privileges based on responsibilities within an application and mandatory access control MAC that emphasizes the protection of information via security tags are two dominant approaches in this regard. The integration of access control into software modeling and analysis is often loose and significantly lacking, particularly when security is such a high-priority concern in applications. This article presents an approach to integrate RBAC and MAC into use-case, class, and sequence diagrams of the unified modeling language UML, providing a cohesive approach to secure software modeling that elevates security to a first-class citizen in the process. To insure that a UML design with security does not violate RBAC or MAC requirements, design-time analysis checks security constraints whenever a new UML element is added or an existing UML element is modified, while post-design analysis checks security constraints across the entire design for conflicts and inconsistencies. These access control extensions and security analyses have been prototyped within a UML tool.


american medical informatics association annual symposium | 2010

Secure, Obligated and Coordinated Collaboration in Health Care for the Patient-Centered Medical Home

Solomon Berhe; Steve Demurjian; Rishi Kanth Saripalle; Thomas Agresta; Jing Liu; Antonio Cusano; Andal Fequiere; Jim Gedarovich


software engineering and knowledge engineering | 2009

An Integrated Ontology Framework for Health Information Exchange.

Steven A. Demurjian; Rishi Kanth Saripalle; Solomon Berhe


Archive | 2008

Axon - An Adaptive Collaborative Web Portal

Solomon Berhe; Steven A. Demurjian; H. Ren; M. Devineni; S. Vegad; K. Polineni


Archive | 2014

An Integrated Secure Software Engineering Approach for Functional, Collaborative, and Information Concerns

Jaime A. Pavlich-Mariscal; Solomon Berhe; A. De la Rosa Algarín; Steven A. Demurjian


Archive | 2010

Improving the Information Security of Collaborative Web Portals via Fine-Grained Role-Based Access Control

Steven A. Demurjian; H. Ren; Solomon Berhe; M. Devineni; Sushil Vegad; K. Polineni


Archive | 2016

Leveraging UML for Access Control Engineering in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC

Solomon Berhe; Steven A. Demurjian; Jaime A. Pavlich-Mariscal; Rishi Kanth Saripalle; Alberto De la Rosa Algarín

Collaboration


Dive into the Solomon Berhe's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Thomas Agresta

University of Connecticut Health Center

View shared research outputs
Top Co-Authors

Avatar

H. Ren

University of Connecticut

View shared research outputs
Top Co-Authors

Avatar

K. Polineni

University of Connecticut

View shared research outputs
Top Co-Authors

Avatar

M. Devineni

University of Connecticut

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jinbo Bi

University of Connecticut

View shared research outputs
Top Co-Authors

Avatar

Laurent Michel

University of Connecticut

View shared research outputs
Researchain Logo
Decentralizing Knowledge