Patient-centric authorization framework for electronic healthcare services
暂无分享,去创建一个
Gail-Joon Ahn | Hongxin Hu | Xinwen Zhang | Jing Jin | Michael J. Covington | Xinwen Zhang | Gail-Joon Ahn | Hongxin Hu | M. Covington | Jing Jin
[1] Ning Zhang,et al. A Purpose-Based Access Control Model , 2007, Third International Symposium on Information Assurance and Security.
[2] Linda Dimitropoulos. Privacy and security solutions for interoperable health information exchange: Assessment of variation and analysis of solutions , 2007 .
[3] Joy L Pritts,et al. Implementation of E-Consent Mechanisms in Three Countries: Canada, England, and the Netherlands , 2007 .
[4] Arif Ghafoor,et al. Policy-based security management for federated healthcare databases (or RHIOs) , 2006, HIKM '06.
[5] Chen-Nee Chuah,et al. FIREMAN: a toolkit for firewall modeling and analysis , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[6] David M. Eyers,et al. OASIS role-based access control for electronic health records , 2006, IEE Proc. Softw..
[7] Amnon Shabo,et al. Model Formulation: HL7 Clinical Document Architecture, Release 2 , 2006, J. Am. Medical Informatics Assoc..
[8] Elisa Bertino,et al. Purpose based access control of complex data for privacy protection , 2005, SACMAT '05.
[9] Michael Carl Tschantz,et al. Verification and change-impact analysis of access-control policies , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[10] Paul Greenfield,et al. A Decentralised Approach to Electronic Consent and Health Information Access Control , 2005, J. Res. Pract. Inf. Technol..
[11] Peter Sewell,et al. Cassandra: flexible trust management, applied to electronic health records , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[12] Maarten Marx,et al. Specifying access control policies for XML documents with XPath , 2004, SACMAT '04.
[13] Roger Clarke,et al. Viewpoint Paper: e-Consent: The Design And Implementation of Consumer Consent Mechanisms in an Electronic Environment , 2004, J. Am. Medical Informatics Assoc..
[14] Vijay Varadharajan,et al. An Authorization Model for E-consent Requirement in a Health Care Application , 2003, ACNS.
[15] Jacob Slonim,et al. Owner-controlled information , 2003, NSPW '03.
[16] E. Al-Shaer,et al. Firewall Policy Advisor for anomaly discovery and rule editing , 2003, IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003..
[17] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[18] Sushil Jajodia,et al. A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[19] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.