-
1
-
-
0035004828
-
A systematic approach for analysis and design of secure health information systems
-
Blobel B, Roger-France F: A Systematic Approach for Analysis and Design of Secure Health Information Systems.International Journal of Medical Informatics 62 (2001) 3, pp.51-78.
-
(2001)
International Journal of Medical Informatics
, vol.62
, Issue.3
, pp. 51-78
-
-
Blobel, B.1
Roger-France, F.2
-
3
-
-
0030086382
-
Role-based access control models
-
2001, Febr.1996.
-
Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models.IEEE Computer 29 (2) 2001, 38-47, Febr.1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
4
-
-
0242709332
-
A scenariodriven role engineering process for functional rbac roles
-
June 34, Monterey, California, USA.ACM 1581134967/02/0006
-
Neumann G, Strembeck M: A Scenariodriven Role Engineering Process for Functional RBAC Roles.Proceedings of SACMAT'02, June 34, 2002, Monterey, California, USA.ACM 1581134967/02/0006
-
(2002)
Proceedings of SACMAT'02
-
-
Neumann, G.1
Strembeck, M.2
-
5
-
-
84887057874
-
Analysis, design and implementation of secure and interoperable distributed health information systems
-
Amsterdam: IOS Press
-
Blobel B.Analysis, Design and Implementation of Secure and Interoperable Distributed Health Information Systems.Series Studies in Health Technology and Informatics, Vol.89.Amsterdam: IOS Press, 2002.
-
(2002)
Series Studies in Health Technology and Informatics
, vol.89
-
-
Blobel, B.1
-
6
-
-
33745272574
-
Assessment of middleware concepts using a generic component model proceedings of the conference
-
London
-
Blobel B: Assessment of Middleware Concepts Using a Generic Component Model.Proceedings of the Conference "Toward An Electronic Health Record Europe '97", pp.221-228.London 1997.
-
(1997)
Toward An Electronic Health Record Europe '97
, pp. 221-228
-
-
Blobel, B.1
-
8
-
-
0004239720
-
-
The Language Specification, Version 2.3.Imperial College Research Report DoC 2000 1.20 October
-
Damianou N, Dulay N, Lupu E, Sloman M.Ponder: A Language for Specifying Security and Management Policies for Distributed Systems.The Language Specification, Version 2.3.Imperial College Research Report DoC 2000/1.20 October, 2000.
-
(2000)
A Language for Specifying Security and Management Policies for Distributed Systems
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Ponder, S.M.4
-
9
-
-
84887958747
-
-
Health Level Seven Inc.
-
Health Level Seven Inc.: www.hl7.org
-
-
-
-
10
-
-
0008270881
-
-
John Wiley &Sons, New York, Chichester, Weinheim, Brisbane, Singapore, Toronto
-
Siegel J: Quick CORBA® 3.John Wiley &Sons, New York, Chichester, Weinheim, Brisbane, Singapore, Toronto 2001.
-
(2001)
Quick CORBA® 3
-
-
Siegel, J.1
-
11
-
-
1842474926
-
Authorisation and access control for electronic health record systems
-
Blobel B: Authorisation and Access Control for Electronic Health Record Systems.International Journal of Medical Informatics 73 (2004) pp.251-257.
-
(2004)
International Journal of Medical Informatics
, vol.73
, pp. 251-257
-
-
Blobel, B.1
-
12
-
-
84992227458
-
Proposed nist standard for role-based access control
-
August
-
Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R: Proposed NIST Standard for Role-Based Access Control.ACM Transactions on Information and system Security, Vol.4 No.3, August 2001, pp.224-274
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
14
-
-
0003981627
-
-
RFC 2692, September
-
Ellison CM: SPKI requirements, RFC 2692, September 1999.See http://www.ietf.org/rfc/rfc2692.txt.
-
(1999)
SPKI Requirements
-
-
Ellison, C.M.1
-
15
-
-
84942243858
-
Using first-order logic to reason about policies
-
Halpern JY and Weissman V: Using first-order logic to reason about policies.In CSFW, pages 187-201, 2003.
-
(2003)
CSFW
, pp. 187-201
-
-
Halpern, J.Y.1
Weissman, V.2
-
16
-
-
0034428960
-
Policy-directed certificate retrieval
-
Gunter C and Jim T: Policy-directed certificate retrieval.Software- Practice and Experience, 30(15):1609-1640, 2000.
-
(2000)
Software-Practice and Experience
, vol.30
, Issue.15
, pp. 1609-1640
-
-
Gunter, C.1
Jim, T.2
-
20
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
Bacon J, Moody K, Yao W: A model of OASIS role-based access control and its support for active security.ACM Transactions on Information and System Security, 5(4):492-540, 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
21
-
-
84887934221
-
-
OASIS Inc
-
OASIS Inc.: http://docs.oasis-open.org
-
-
-
-
22
-
-
84887959335
-
-
OASIS Inc
-
OASIS Inc.: http://docs.oasis-open.org/xacml/2.0/
-
-
-
-
23
-
-
84887873842
-
-
OASIS Inc
-
OASIS Inc.: http://docs.oasis-open.org/saml/
-
-
-
-
28
-
-
0042879534
-
Using a privilege management infrastructure for secure web-based e-health applications
-
Blobel B, Hoepner P, Joop R, Karnouskos S, Kleinhuis G, Stassinopoulos G: Using a privilege management infrastructure for secure web-based e-health applications.Computer Communications 26 (2003), pp.1863-1872.
-
(2003)
Computer Communications
, vol.26
, pp. 1863-1872
-
-
Blobel, B.1
Hoepner, P.2
Joop, R.3
Karnouskos, S.4
Kleinhuis, G.5
Stassinopoulos, G.6
|