Authorization Service

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 132 Experts worldwide ranked by ideXlab platform

Binita Patel - One of the best experts on this subject based on the ideXlab platform.

  • implementation of a comprehensive medication prior Authorization Service
    American Journal of Health-system Pharmacy, 2015
    Co-Authors: Robert Leinss, Todd A Karpinski, Binita Patel
    Abstract:

    Purpose The development and successful implementation of a comprehensive medication prior-Authorization Service are described. Summary At our 550-bed academic medical center, we found an increasing number of Medicare write-offs as a result of the off-label use of specialty medications. Furthermore, more insurers were requiring that prior Authorization be attained before patients began treatment with a high-cost specialty medication. After investigating who was pursuing these prior Authorizations and where they were documented, it became clear that no department within the hospital owned this responsibility. Our pharmacy department initiated a specialty medication prior-Authorization and medication assistance program to review all medication orders written for high-cost specialty medications administered or infused in any of the health system’s outpatient clinics, including chemotherapy infusions. A full-time specialty pharmacy coordinator was hired in fall 2010. This pharmacist was responsible for spearheading the overall specialty medication strategy for the health system. Our prior-Authorization work across our health system has not only helped to reduce Medicare write-offs and commercial insurance denials but also has resulted in closer working relationships with individuals in other departments of the hospital. Several million dollars in additional write-offs were avoided because our prior-Authorization staff identified prescribed therapies that would not be covered by Medicare or commercial insurers before they were started. In total, we decreased write-offs or increased revenues by over $6.2 million during this time frame, a return on investment exceeding 20:1. Conclusion A comprehensive medication prior-Authorization Service generated additional revenue due to a decrease in lost charges and an increase in net reimbursement.

Von Welch - One of the best experts on this subject based on the ideXlab platform.

  • the traust Authorization Service
    ACM Transactions on Information and System Security, 2008
    Co-Authors: Adam J Lee, Marianne Winslett, Jim Basney, Von Welch
    Abstract:

    In recent years, trust negotiation has been proposed as a novel Authorization solution for use in open-system environments, in which resources are shared across organizational boundaries. Researchers have shown that trust negotiation is indeed a viable solution for these environments by developing a number of policy languages and strategies for trust negotiation that have desirable theoretical properties. Further, existing protocols, such as TLS, have been altered to interact with prototype trust negotiation systems, thereby illustrating the utility of trust negotiation. Unfortunately, modifying existing protocols is often a time-consuming and bureaucratic process that can hinder the adoption of this promising technology.In this paper, we present Traust, a third-party Authorization Service that leverages the strengths of existing prototype trust negotiation systems. Traust acts as an Authorization broker that issues access tokens for resources in an open system after entities use trust negotiation to satisfy the appropriate resource access policies. The Traust architecture was designed to allow Traust to be integrated either directly with newer trust-aware applications or indirectly with existing legacy applications; this flexibility paves the way for the incremental adoption of trust negotiation technologies without requiring widespread software or protocol upgrades. We discuss the design and implementation of Traust, the communication protocol used by the Traust system, and its performance. We also discuss our experiences using Traust to broker access to legacy resources, our proposal for a Traust-aware version of the GridFTP protocol, and Traust's resilience to attack.

  • traust a trust negotiation based Authorization Service for open systems
    Symposium on Access Control Models and Technologies, 2006
    Co-Authors: Adam J Lee, Marianne Winslett, Jim Basney, Von Welch
    Abstract:

    In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizational boundaries. Researchers have shown that TN is indeed a viable solution for these environments by developing a number of policy languages and strategies for TN which have desirable theoretical properties. Further, existing protocols, such as TLS, have been altered to interact with prototype TN systems, thereby illustrating the utility of TN. Unfortunately, modifying existing protocols is often a time-consuming and bureaucratic process which can hinder the adoption of this promising technology.In this paper, we present Traust, a third-party Authorization Service that leverages the strengths of existing proto-type TN systems. Traust acts as an Authorization broker that issues access tokens for resources in an open system after entities use TN to satisfy the appropriate resource access policies. The Traust architecture was designed to allow Traust to be integrated either directly with newer trust-aware applications or indirectly with existing legacy applications; this exibility paves the way for the incremental adoption of TN technologies without requiring widespread software or protocol upgrades. We discuss the design and implementation of Traust, the communication protocol used by the Traust system, and its performance. We also discuss our experiences using Traust to broker access to legacy resources, our proposal for a Traust-aware version of the GridFTP protocol, and Traust's resilience to attack.

  • the community Authorization Service status and future
    arXiv: Software Engineering, 2003
    Co-Authors: Laura Pearlman, Carl Kesselman, Von Welch, Ian Foster, Steve Tuecke
    Abstract:

    Virtual organizations (VOs) are communities of resource providers and users distributed over multiple policy domains. These VOs often wish to define and enforce consistent policies in addition to the policies of their underlying domains. This is challenging, not only because of the problems in distributing the policy to the domains, but also because of the fact that those domains may each have different capabilities for enforcing the policy. The Community Authorization Service (CAS) solves this problem by allowing resource providers to delegate some policy authority to the VO while maintaining ultimate control over their resources. In this paper we describe CAS and our past and current implementations of CAS, and we discuss our plans for CAS-related research.

  • a community Authorization Service for group collaboration
    arXiv: Distributed Parallel and Cluster Computing, 2003
    Co-Authors: Laura Pearlman, Carl Kesselman, Von Welch, Ian Foster, Steven Tuecke
    Abstract:

    In "Grids" and "collaboratories," we find distributed communities of resource providers and resource consumers, within which often complex and dynamic policies govern who can use which resources for which purpose. We propose a new approach to the representation, maintenance, and enforcement of such policies that provides a scalable mechanism for specifying and enforcing these policies. Our approach allows resource providers to delegate some of the authority for maintaining fine-grained access control policies to communities, while still maintaining ultimate control over their resources. We also describe a prototype implementation of this approach and an application in a data management context.

Marianne Winslett - One of the best experts on this subject based on the ideXlab platform.

  • the traust Authorization Service
    ACM Transactions on Information and System Security, 2008
    Co-Authors: Adam J Lee, Marianne Winslett, Jim Basney, Von Welch
    Abstract:

    In recent years, trust negotiation has been proposed as a novel Authorization solution for use in open-system environments, in which resources are shared across organizational boundaries. Researchers have shown that trust negotiation is indeed a viable solution for these environments by developing a number of policy languages and strategies for trust negotiation that have desirable theoretical properties. Further, existing protocols, such as TLS, have been altered to interact with prototype trust negotiation systems, thereby illustrating the utility of trust negotiation. Unfortunately, modifying existing protocols is often a time-consuming and bureaucratic process that can hinder the adoption of this promising technology.In this paper, we present Traust, a third-party Authorization Service that leverages the strengths of existing prototype trust negotiation systems. Traust acts as an Authorization broker that issues access tokens for resources in an open system after entities use trust negotiation to satisfy the appropriate resource access policies. The Traust architecture was designed to allow Traust to be integrated either directly with newer trust-aware applications or indirectly with existing legacy applications; this flexibility paves the way for the incremental adoption of trust negotiation technologies without requiring widespread software or protocol upgrades. We discuss the design and implementation of Traust, the communication protocol used by the Traust system, and its performance. We also discuss our experiences using Traust to broker access to legacy resources, our proposal for a Traust-aware version of the GridFTP protocol, and Traust's resilience to attack.

  • traust a trust negotiation based Authorization Service for open systems
    Symposium on Access Control Models and Technologies, 2006
    Co-Authors: Adam J Lee, Marianne Winslett, Jim Basney, Von Welch
    Abstract:

    In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizational boundaries. Researchers have shown that TN is indeed a viable solution for these environments by developing a number of policy languages and strategies for TN which have desirable theoretical properties. Further, existing protocols, such as TLS, have been altered to interact with prototype TN systems, thereby illustrating the utility of TN. Unfortunately, modifying existing protocols is often a time-consuming and bureaucratic process which can hinder the adoption of this promising technology.In this paper, we present Traust, a third-party Authorization Service that leverages the strengths of existing proto-type TN systems. Traust acts as an Authorization broker that issues access tokens for resources in an open system after entities use TN to satisfy the appropriate resource access policies. The Traust architecture was designed to allow Traust to be integrated either directly with newer trust-aware applications or indirectly with existing legacy applications; this exibility paves the way for the incremental adoption of TN technologies without requiring widespread software or protocol upgrades. We discuss the design and implementation of Traust, the communication protocol used by the Traust system, and its performance. We also discuss our experiences using Traust to broker access to legacy resources, our proposal for a Traust-aware version of the GridFTP protocol, and Traust's resilience to attack.

  • trust negotiation as an Authorization Service forweb Services
    International Conference on Data Engineering, 2006
    Co-Authors: L Olson, Marianne Winslett, G Tonti, N Seeley, A Uszok, Jeffrey M Bradshaw
    Abstract:

    Like other open computing environments, web Services need a scalable method of determining authorized users. We present desiderata for Authorization facilities for web Services, and analyze potential ways of satisfying them. We propose a third-party Authorization system for web Services based on trust negotiation, discuss its implementation using the TrustBuilder runtime system for trust negotiation, and present performance results from a stock trading application.

Jeffrey M Bradshaw - One of the best experts on this subject based on the ideXlab platform.

  • trust negotiation as an Authorization Service forweb Services
    International Conference on Data Engineering, 2006
    Co-Authors: L Olson, Marianne Winslett, G Tonti, N Seeley, A Uszok, Jeffrey M Bradshaw
    Abstract:

    Like other open computing environments, web Services need a scalable method of determining authorized users. We present desiderata for Authorization facilities for web Services, and analyze potential ways of satisfying them. We propose a third-party Authorization system for web Services based on trust negotiation, discuss its implementation using the TrustBuilder runtime system for trust negotiation, and present performance results from a stock trading application.

  • policy and contract management for semantic web Services
    2004
    Co-Authors: Andrzej Uszok, Jeffrey M Bradshaw, R Jeffers, Matthew Johnson, Austin Tate, J Dalton, Stuart Aitken
    Abstract:

    This paper summarizes our efforts to develop capabilities for policy and contract management for Semantic Web Services applications. KAoS Services and tools allow for the specification, management, analyzes, disclosure and enforcement of policies represented in OWL. We discuss three current Semantic Web Services applications as examples of the kinds of roles that a policy management framework can play: as an Authorization Service in grid computing environments, as a distributed policy specification and enforcement capability for a semantic matchmaker, and as a verification tool for Services composition and contract management.

Robert Leinss - One of the best experts on this subject based on the ideXlab platform.

  • implementation of a comprehensive medication prior Authorization Service
    American Journal of Health-system Pharmacy, 2015
    Co-Authors: Robert Leinss, Todd A Karpinski, Binita Patel
    Abstract:

    Purpose The development and successful implementation of a comprehensive medication prior-Authorization Service are described. Summary At our 550-bed academic medical center, we found an increasing number of Medicare write-offs as a result of the off-label use of specialty medications. Furthermore, more insurers were requiring that prior Authorization be attained before patients began treatment with a high-cost specialty medication. After investigating who was pursuing these prior Authorizations and where they were documented, it became clear that no department within the hospital owned this responsibility. Our pharmacy department initiated a specialty medication prior-Authorization and medication assistance program to review all medication orders written for high-cost specialty medications administered or infused in any of the health system’s outpatient clinics, including chemotherapy infusions. A full-time specialty pharmacy coordinator was hired in fall 2010. This pharmacist was responsible for spearheading the overall specialty medication strategy for the health system. Our prior-Authorization work across our health system has not only helped to reduce Medicare write-offs and commercial insurance denials but also has resulted in closer working relationships with individuals in other departments of the hospital. Several million dollars in additional write-offs were avoided because our prior-Authorization staff identified prescribed therapies that would not be covered by Medicare or commercial insurers before they were started. In total, we decreased write-offs or increased revenues by over $6.2 million during this time frame, a return on investment exceeding 20:1. Conclusion A comprehensive medication prior-Authorization Service generated additional revenue due to a decrease in lost charges and an increase in net reimbursement.