Proposing hierarchy-similarity based access control framework: A multilevel Electronic Health Record data sharing approach for interoperable environment
暂无分享,去创建一个
[1] Federica Cena,et al. User model interoperability: a survey , 2011, User Modeling and User-Adapted Interaction.
[2] Deepti Mehrotra,et al. Exploring Interoperability Approaches and Challenges in Healthcare Data Exchange , 2013, ICSH.
[3] Tao Xie,et al. ACPT: A Tool for Modeling and Verifying Access Control Policies , 2010, 2010 IEEE International Symposium on Policies for Distributed Systems and Networks.
[4] Mahieddine Djoudi,et al. Task Collaborative Resolution Tool for Elearning Environment , 2006 .
[5] Bo Hu,et al. A knowledgeable security model for distributed health information systems , 2010, Comput. Secur..
[6] Tao Xie,et al. Model Checking for Verification of Mandatory Access Control Models and Properties , 2011, Int. J. Softw. Eng. Knowl. Eng..
[7] Mark Ryan,et al. A Knowledge-Based Verification Method for Dynamic Access Control Policies , 2011, ICFEM.
[8] Deepti Mehrotra,et al. Applying CHAID algorithm to investigate critical attributes of secured interoperable health data exchange , 2015, Int. J. Electron. Heal..
[9] Ramaswamy Chandramouli. Business Process Driven Framework for Defining an Access Control Service Based on Roles and Rules , 2000 .
[10] Giuseppe De Pietro,et al. Middleware mechanisms for interaction interoperability in Collaborative Virtual Environments , 2010, Int. J. Adv. Media Commun..
[11] Ning Zhang,et al. A Purpose-Based Access Control Model , 2007 .
[12] Ibrahim M. Alabdulmohsin,et al. Techniques and algorithms for access control list optimization , 2009, Comput. Electr. Eng..
[13] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[14] Sylvia L. Osborn,et al. The role graph model and conflict of interest , 1999, TSEC.
[15] Michael Carl Tschantz,et al. Verification and change-impact analysis of access-control policies , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[16] Marco Pistore,et al. NuSMV 2: An OpenSource Tool for Symbolic Model Checking , 2002, CAV.
[17] Jorge Lobo,et al. An approach to evaluate policy similarity , 2007, SACMAT '07.
[18] Tao Xie,et al. Automated Test Generation for Access Control Policies via Change-Impact Analysis , 2007, Third International Workshop on Software Engineering for Secure Systems (SESS'07: ICSE Workshops 2007).
[19] Isabella M. Venter,et al. Towards ensuring scalability, interoperability and efficient access control in a multi-domain grid-based environment , 2013 .