Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment
暂无分享,去创建一个
[1] Frédéric Cuppens,et al. Administration Model for Or-BAC , 2003, OTM Workshops.
[2] Drew Pg. Integrating the healthcare enterprise. , 2000, M.D. computing : computers in medical practice.
[3] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[4] Sandro Etalle,et al. A posteriori compliance control , 2007, SACMAT '07.
[5] Jerry den Hartog,et al. An audit logic for accountability , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).
[6] Nora Cuppens-Boulahia,et al. Modeling contextual security policies , 2008, International Journal of Information Security.
[7] Chris Lonvick,et al. The BSD Syslog Protocol , 2001, RFC.
[8] Jerry den Hartog,et al. A Logic for Auditing Accountability in Decentralized Systems , 2004, Formal Aspects in Security and Trust.
[9] D. Richard Kuhn,et al. Role-Based Access Controls , 2009, ArXiv.
[10] Marshall T. Rose,et al. Reliable Delivery for syslog , 2001, RFC.
[11] Nora Cuppens-Boulahia,et al. O2O: Virtual Private Organizations to Manage Security Policy Interoperability , 2006, ICISS.
[12] Sandro Etalle,et al. Audit-Based Access Control for Electronic Health Records , 2007, Electron. Notes Theor. Comput. Sci..