메뉴 건너뛰기




Volumn , Issue , 2008, Pages 441-450

A workflow-based access control framework for e-Health applications

Author keywords

[No Author keywords available]

Indexed keywords

EHEALTH;

EID: 50249126670     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WAINA.2008.131     Document Type: Conference Paper
Times cited : (28)

References (33)
  • 1
    • 35048901912 scopus 로고    scopus 로고
    • Design and implementation of the YAWL system
    • A. Persson and J. Stirna, editors, Proceedings of The 16th International Conference on Advanced Information Systems Engineering CAiSE 04, of, Riga, Latvia, June, Springer Verlag
    • W.M.P. van der Aalst, L. Aldred, M. Dumas, and A.H.M. ter Hofstede. "Design and implementation of the YAWL system." In A. Persson and J. Stirna, editors, Proceedings of The 16th International Conference on Advanced Information Systems Engineering (CAiSE 04), volume 3084 of LNCS, pp. 142-159, Riga, Latvia, June 2004. Springer Verlag.
    • (2004) LNCS , vol.3084 , pp. 142-159
    • van der Aalst, W.M.P.1    Aldred, L.2    Dumas, M.3    ter Hofstede, A.H.M.4
  • 4
    • 84949747356 scopus 로고    scopus 로고
    • An Authorization Model for Workflows
    • Proceedings of the Fifth European Symposium on Research in Computer Security, Rome, Italy, pp, Berlin: Springer-Verlag
    • V. Atluri and W.-K. Huang. "An Authorization Model for Workflows." In Proceedings of the Fifth European Symposium on Research in Computer Security, Rome, Italy, pp. 44-64. Lecture Notes in Computer Science, no. 1146. Berlin: Springer-Verlag.
    • Lecture Notes in Computer Science , vol.1146 , pp. 44-64
    • Atluri, V.1    Huang, W.-K.2
  • 7
    • 3042511452 scopus 로고    scopus 로고
    • S. Chaari, F. Biennier, C. Ben Amar, J. and Favrel. An authorization and access control model for workflow. First International Symposium on Control, Communications and Signal Processing, pp. 141-148, 2004.
    • S. Chaari, F. Biennier, C. Ben Amar, J. and Favrel. "An authorization and access control model for workflow." First International Symposium on Control, Communications and Signal Processing, pp. 141-148, 2004.
  • 11
    • 0034572257 scopus 로고    scopus 로고
    • Towards a new dimension in clinical information processing
    • P. Dadam, and M. Reichert. "Towards a new dimension in clinical information processing." In Stud. Health Technol. Inform., 77, pp. 295-301, 2000.
    • (2000) Stud. Health Technol. Inform , vol.77 , pp. 295-301
    • Dadam, P.1    Reichert, M.2
  • 12
    • 0346580272 scopus 로고    scopus 로고
    • A patient workflow management system built on guidelines
    • L. Dazzi, and M. Stefanelli. "A patient workflow management system built on guidelines." In Proc. of AMIA 97, pp. 146-150, 1997.
    • (1997) Proc. of AMIA , vol.97 , pp. 146-150
    • Dazzi, L.1    Stefanelli, M.2
  • 14
    • 0033562565 scopus 로고    scopus 로고
    • Privacy in clinical information systems in secondary care
    • May
    • I. Denley and S. Weston Smith. "Privacy in clinical information systems in secondary care." In British Medical Journal, 318, pp. 1328-1331, May 1999.
    • (1999) British Medical Journal , vol.318 , pp. 1328-1331
    • Denley, I.1    Weston Smith, S.2
  • 16
    • 33747074188 scopus 로고
    • An overview of workflow management: From process modeling to workflow automation infrastructure
    • D. Georgakopoulos, M. Hornick, and A. Sheth. "An overview of workflow management: from process modeling to workflow automation infrastructure." In Distributed Parallel Databases, 3, 2, pp. 119-153, 1995.
    • (1995) Distributed Parallel Databases , vol.3 , Issue.2 , pp. 119-153
    • Georgakopoulos, D.1    Hornick, M.2    Sheth, A.3
  • 22
    • 39049116565 scopus 로고    scopus 로고
    • Optimistic security: A new access control paradigm
    • ACM Press, Caledon Hills, Ontario, Canada, ISBN: 1581131496
    • D. Povey. "Optimistic security: a new access control paradigm." In Proceedings of the 1999 workshop on New security paradigms. ACM Press, Caledon Hills, Ontario, Canada, 2000. ISBN: 1581131496.
    • (2000) Proceedings of the 1999 workshop on New security paradigms
    • Povey, D.1
  • 24
    • 39049126192 scopus 로고    scopus 로고
    • A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs
    • Miami, Florida, December
    • L. Røstad and O. Edsberg. "A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs." In Proc. of 22nd Annual Computer Security Applications Conference, Miami, Florida, December, 2006.
    • (2006) Proc. of 22nd Annual Computer Security Applications Conference
    • Røstad, L.1    Edsberg, O.2
  • 25
    • 34748859698 scopus 로고    scopus 로고
    • Authorisation and Conflict Resolution for Hierarchical Domains
    • June
    • G. Russello, C. Dong, N. Dulay. "Authorisation and Conflict Resolution for Hierarchical Domains." In Proc. of Policy07 June 2007.
    • (2007) Proc. of Policy07
    • Russello, G.1    Dong, C.2    Dulay, N.3
  • 26
    • 0030086382 scopus 로고    scopus 로고
    • R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. In IEEE Computer 29, 2 (Feb.), pp. 38-47, 1996.
    • R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. "Role-based access control models". In IEEE Computer 29, 2 (Feb.), pp. 38-47, 1996.
  • 28
    • 0036506787 scopus 로고    scopus 로고
    • Security and Management Policy Specification
    • March
    • M. Sloman and E. Lupu. "Security and Management Policy Specification." In IEEE Network, pp.10-19, Vol. 16, Issue 2, March, 2002.
    • (2002) IEEE Network , vol.16 , Issue.2 , pp. 10-19
    • Sloman, M.1    Lupu, E.2
  • 29
    • 84988603769 scopus 로고
    • Towards a Task-based Paradigm for Flexible and Adaptable Access Control in Distributed Applications
    • IEEE Press, pp
    • R.K. Thomas and R.S. Sandhu. "Towards a Task-based Paradigm for Flexible and Adaptable Access Control in Distributed Applications." In Proceedings of the Second New Security Paradigms Workshop, IEEE Press, pp. 138-142, 1993.
    • (1993) Proceedings of the Second New Security Paradigms Workshop , pp. 138-142
    • Thomas, R.K.1    Sandhu, R.S.2
  • 31
    • 50249089343 scopus 로고    scopus 로고
    • R. Thomas and R. Sandhu Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. In Proc. of the IFIP TC11 WG11.3 11th International Conference on Database Securty XI: Status and Prospects, pp. 166-181, 1997.
    • R. Thomas and R. Sandhu "Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management." In Proc. of the IFIP TC11 WG11.3 11th International Conference on Database Securty XI: Status and Prospects, pp. 166-181, 1997.
  • 32
    • 24344501341 scopus 로고    scopus 로고
    • Access control in collaborative systems
    • W. Tolone, G.-J. Ahn, T. Pai, and S.-P. Hong. "Access control in collaborative systems." In ACM Comput. Surv., 37(1), pp. 29-41, 2005.
    • (2005) ACM Comput. Surv , vol.37 , Issue.1 , pp. 29-41
    • Tolone, W.1    Ahn, G.-J.2    Pai, T.3    Hong, S.-P.4
  • 33
    • 0036161253 scopus 로고    scopus 로고
    • Authorization and Access Control of Application Data in Workflow Systems
    • S. Wu, A. Sheth, J. Miller, and Z Luo. "Authorization and Access Control of Application Data in Workflow Systems." In Journal of Intelligent Information Systems, 18(1), pp. 71-94, 2002.
    • (2002) Journal of Intelligent Information Systems , vol.18 , Issue.1 , pp. 71-94
    • Wu, S.1    Sheth, A.2    Miller, J.3    Luo, Z.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.