메뉴 건너뛰기




Volumn 153, Issue 1, 2006, Pages 16-23

OASIS role-based access control for electronic health records

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; PROCESS CONTROL; PUBLIC POLICY;

EID: 33644505205     PISSN: 14625970     EISSN: None     Source Type: Journal    
DOI: 10.1049/ip-sen:20045038     Document Type: Conference Paper
Times cited : (35)

References (36)
  • 4
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • Bacon, J., Moody, K., and Yao, W.: ' A model of OASIS role-based access control and its support for active security ', ACM Trans. Inf. Syst. Secur., 2002, 5, (4), p. 492-540
    • (2002) ACM Trans. Inf. Syst. Secur. , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 5
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • July MITRE Corp., Bedford, MA
    • 'Secure computer systems: Unified exposition and multics interpretation', Technical report, MTR-2997, July, 1975 MITRE Corp., Bedford, MA
    • (1975) Technical Report , vol.MTR-2997
  • 6
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • April MITRE Corp., Bedford, MA
    • 'Integrity considerations for secure computer systems', Technical report, TR-3153, April, 1977 MITRE Corp., Bedford, MA
    • (1977) Technical Report , vol.TR-3153
  • 7
    • 0022012611 scopus 로고
    • A comment on the "basic security theorem" of Bell and LaPadula
    • McLean, J.: ' A comment on the "basic security theorem" of Bell and LaPadula ', ' Inf. Process. Lett. ', 1985, 20, (2), p. 67-70
    • (1985) Inf. Process. Lett. , vol.20 , Issue.2 , pp. 67-70
    • McLean, J.1
  • 8
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • Sandhu, R.S., and Samarati, P.: ' Access control: principles and practice ', IEEE Commun. Mag., 1994, 32, (9), p. 40-48
    • (1994) IEEE Commun. Mag. , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2
  • 11
    • 0001940210 scopus 로고    scopus 로고
    • The role graph model and confiict of interest
    • Nyanchama, M., and Osborn, S.L.: ' The role graph model and confiict of interest ', ACM Trans. Inf. Syst. Secur., 1999, 2, (1), p. 3-33
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 3-33
    • Nyanchama, M.1    Osborn, S.L.2
  • 12
    • 0242571490 scopus 로고
    • Role-based security in database management systems
    • North-Holland Publishing Co., Amsterdam
    • Lochowsky, F.H., and Woo, C.C.: ' Role-based security in database management systems ', Landwehr, C.E., Database security: status prospects, (North-Holland Publishing Co., Amsterdam 1988), p. 209-222
    • (1988) Database Security: Status Prospects , pp. 209-222
    • Lochowsky, F.H.1    Woo, C.C.2
  • 20
    • 84944039217 scopus 로고    scopus 로고
    • Translating role-based access control policy within context
    • Bacon, J.M., Lloyd, M., and Moody, K.:: ' Translating role-based access control policy within context ', Lect. Notes Comput. Sci., 2001, 1995, p. 107-119
    • (2001) Lect. Notes Comput. Sci. , vol.1995 , pp. 107-119
    • Bacon, J.M.1    Lloyd, M.2    Moody, K.3
  • 24
    • 1542388763 scopus 로고    scopus 로고
    • Rei: A policy language for the me-centric project
    • 4, October Hewlett Packard Laboratories
    • 'Rei: a policy language for the me-centric project', Technical report HPL-2002-270, 4, October, 2002 Hewlett Packard Laboratories
    • (2002) Technical Report , vol.HPL-2002-270
  • 34
    • 84957006898 scopus 로고    scopus 로고
    • Access control and trust in the use of widely distributed services
    • Bacon, J.M., Moody, K., and Yao, W.: ' Access control and trust in the use of widely distributed services ', Lect Notes Comput. Sci., 2001, 2218, p. 295-310
    • (2001) Lect Notes Comput. Sci. , vol.2218 , pp. 295-310
    • Bacon, J.M.1    Moody, K.2    Yao, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.