Patient-centric authorization framework for electronic healthcare services

[1]  Ning Zhang,et al.  A Purpose-Based Access Control Model , 2007, Third International Symposium on Information Assurance and Security.

[2]  Linda Dimitropoulos Privacy and security solutions for interoperable health information exchange: Assessment of variation and analysis of solutions , 2007 .

[3]  Joy L Pritts,et al.  Implementation of E-Consent Mechanisms in Three Countries: Canada, England, and the Netherlands , 2007 .

[4]  Arif Ghafoor,et al.  Policy-based security management for federated healthcare databases (or RHIOs) , 2006, HIKM '06.

[5]  Chen-Nee Chuah,et al.  FIREMAN: a toolkit for firewall modeling and analysis , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[6]  David M. Eyers,et al.  OASIS role-based access control for electronic health records , 2006, IEE Proc. Softw..

[7]  Amnon Shabo,et al.  Model Formulation: HL7 Clinical Document Architecture, Release 2 , 2006, J. Am. Medical Informatics Assoc..

[8]  Elisa Bertino,et al.  Privacy Protection , 2022 .

[9]  Michael Carl Tschantz,et al.  Verification and change-impact analysis of access-control policies , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..

[10]  Paul Greenfield,et al.  A Decentralised Approach to Electronic Consent and Health Information Access Control , 2005, J. Res. Pract. Inf. Technol..

[11]  Peter Sewell,et al.  Cassandra: flexible trust management, applied to electronic health records , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..

[12]  Maarten Marx,et al.  Specifying access control policies for XML documents with XPath , 2004, SACMAT '04.

[13]  Roger Clarke,et al.  Viewpoint Paper: e-Consent: The Design And Implementation of Consumer Consent Mechanisms in an Electronic Environment , 2004, J. Am. Medical Informatics Assoc..

[14]  Vijay Varadharajan,et al.  An Authorization Model for E-consent Requirement in a Health Care Application , 2003, ACNS.

[15]  Jacob Slonim,et al.  Owner-controlled information , 2003, NSPW '03.

[16]  E. Al-Shaer,et al.  Firewall Policy Advisor for anomaly discovery and rule editing , 2003, IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003..

[17]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.

[18]  Sushil Jajodia,et al.  A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[19]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.