메뉴 건너뛰기




Volumn 121, Issue , 2006, Pages 307-316

Formal policies for flexible EHR security

Author keywords

Access control; Authorisation; Meta languages Security; Model Driven Architecture; Policy; Privacy

Indexed keywords

ACCESS CONTROL; BIOASSAY; DATA PRIVACY; HEALTH; INFORMATION SYSTEMS; PUBLIC POLICY; SOFTWARE ARCHITECTURE; SOFTWARE DESIGN;

EID: 39049189023     PISSN: 09269630     EISSN: 18798365     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (28)
  • 1
    • 0035004828 scopus 로고    scopus 로고
    • A systematic approach for analysis and design of secure health information systems
    • Blobel B, Roger-France F: A Systematic Approach for Analysis and Design of Secure Health Information Systems.International Journal of Medical Informatics 62 (2001) 3, pp.51-78.
    • (2001) International Journal of Medical Informatics , vol.62 , Issue.3 , pp. 51-78
    • Blobel, B.1    Roger-France, F.2
  • 4
    • 0242709332 scopus 로고    scopus 로고
    • A scenariodriven role engineering process for functional rbac roles
    • June 34, Monterey, California, USA.ACM 1581134967/02/0006
    • Neumann G, Strembeck M: A Scenariodriven Role Engineering Process for Functional RBAC Roles.Proceedings of SACMAT'02, June 34, 2002, Monterey, California, USA.ACM 1581134967/02/0006
    • (2002) Proceedings of SACMAT'02
    • Neumann, G.1    Strembeck, M.2
  • 5
    • 84887057874 scopus 로고    scopus 로고
    • Analysis, design and implementation of secure and interoperable distributed health information systems
    • Amsterdam: IOS Press
    • Blobel B.Analysis, Design and Implementation of Secure and Interoperable Distributed Health Information Systems.Series Studies in Health Technology and Informatics, Vol.89.Amsterdam: IOS Press, 2002.
    • (2002) Series Studies in Health Technology and Informatics , vol.89
    • Blobel, B.1
  • 6
    • 33745272574 scopus 로고    scopus 로고
    • Assessment of middleware concepts using a generic component model proceedings of the conference
    • London
    • Blobel B: Assessment of Middleware Concepts Using a Generic Component Model.Proceedings of the Conference "Toward An Electronic Health Record Europe '97", pp.221-228.London 1997.
    • (1997) Toward An Electronic Health Record Europe '97 , pp. 221-228
    • Blobel, B.1
  • 9
    • 84887958747 scopus 로고    scopus 로고
    • Health Level Seven Inc.
    • Health Level Seven Inc.: www.hl7.org
  • 10
    • 0008270881 scopus 로고    scopus 로고
    • John Wiley &Sons, New York, Chichester, Weinheim, Brisbane, Singapore, Toronto
    • Siegel J: Quick CORBA® 3.John Wiley &Sons, New York, Chichester, Weinheim, Brisbane, Singapore, Toronto 2001.
    • (2001) Quick CORBA® 3
    • Siegel, J.1
  • 11
    • 1842474926 scopus 로고    scopus 로고
    • Authorisation and access control for electronic health record systems
    • Blobel B: Authorisation and Access Control for Electronic Health Record Systems.International Journal of Medical Informatics 73 (2004) pp.251-257.
    • (2004) International Journal of Medical Informatics , vol.73 , pp. 251-257
    • Blobel, B.1
  • 14
    • 0003981627 scopus 로고    scopus 로고
    • RFC 2692, September
    • Ellison CM: SPKI requirements, RFC 2692, September 1999.See http://www.ietf.org/rfc/rfc2692.txt.
    • (1999) SPKI Requirements
    • Ellison, C.M.1
  • 15
    • 84942243858 scopus 로고    scopus 로고
    • Using first-order logic to reason about policies
    • Halpern JY and Weissman V: Using first-order logic to reason about policies.In CSFW, pages 187-201, 2003.
    • (2003) CSFW , pp. 187-201
    • Halpern, J.Y.1    Weissman, V.2
  • 16
    • 0034428960 scopus 로고    scopus 로고
    • Policy-directed certificate retrieval
    • Gunter C and Jim T: Policy-directed certificate retrieval.Software- Practice and Experience, 30(15):1609-1640, 2000.
    • (2000) Software-Practice and Experience , vol.30 , Issue.15 , pp. 1609-1640
    • Gunter, C.1    Jim, T.2
  • 20
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • Bacon J, Moody K, Yao W: A model of OASIS role-based access control and its support for active security.ACM Transactions on Information and System Security, 5(4):492-540, 2002.
    • (2002) ACM Transactions on Information and System Security , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 21
    • 84887934221 scopus 로고    scopus 로고
    • OASIS Inc
    • OASIS Inc.: http://docs.oasis-open.org
  • 22
    • 84887959335 scopus 로고    scopus 로고
    • OASIS Inc
    • OASIS Inc.: http://docs.oasis-open.org/xacml/2.0/
  • 23
    • 84887873842 scopus 로고    scopus 로고
    • OASIS Inc
    • OASIS Inc.: http://docs.oasis-open.org/saml/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.