메뉴 건너뛰기




Volumn 2727 LNCS, Issue , 2003, Pages 403-415

A novel use of RBAC to protect privacy in distributed health care information systems

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS POLICIES; CONTROL FRAMEWORKS; CONTROL REQUIREMENTS; HEALTH CARE INFORMATION SYSTEMS; HEALTH INFORMATIONS; INFORMATION NETWORKS; MEDICAL INFORMATION SYSTEMS; PERSONAL HEALTHS; RBAC MODELS; ROLE-BASED ACCESS CONTROLS; SUPPORT POLICIES; CONTROL FRAMEWORK; HEALTH CARE INFORMATION SYSTEM; PERSONAL HEALTH INFORMATIONS; ROLE-BASED ACCESS CONTROL;

EID: 63449110864     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45067-X_35     Document Type: Conference Paper
Times cited : (37)

References (16)
  • 4
    • 63449111397 scopus 로고    scopus 로고
    • R. Clarke. e-Consent: a critical element of trust in e-business. In 15th Bled Electronic Commerce Conference. e-Reality: Constructing the e-Economy - Research 2002.
    • R. Clarke. e-Consent: a critical element of trust in e-business. In 15th Bled Electronic Commerce Conference. e-Reality: Constructing the e-Economy - Research Volume, 2002.
  • 6
    • 0033562565 scopus 로고    scopus 로고
    • Privacy in clinical information systems in secondary care
    • May
    • I. Denley and S. Weston Smith. Privacy in clinical information systems in secondary care. British Medical Journal, 318:1328-1331, May 1999.
    • (1999) British Medical Journal , vol.318 , pp. 1328-1331
    • Denley, I.1    Weston Smith, S.2
  • 7
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate intranet
    • February
    • D. Ferraiolo, J. Barkley, and D. Kuhn. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security, 2(1):34-64, February 1999.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 34-64
    • Ferraiolo, D.1    Barkley, J.2    Kuhn, D.3
  • 13
    • 0033646048 scopus 로고    scopus 로고
    • A model of accountability, confidentiality and override for healthcare and other applications
    • ACM Press
    • J. J. Longstaff, M. A. Lockyer, and M. G. Thick. A model of accountability, confidentiality and override for healthcare and other applications. In 5th ACM workshop on Role-based access control, pages 71-76. ACM Press, 2000.
    • (2000) 5th ACM workshop on Role-based access control , pp. 71-76
    • Longstaff, J.J.1    Lockyer, M.A.2    Thick, M.G.3
  • 14
    • 63449132143 scopus 로고    scopus 로고
    • I. Mavridis, G. Pangalos, and M. Khair. eMEDAC: Role-based access control supporting discretionary and mandatory features. In 13th IFIP WG 11.3 Working Conference on Database Security, 1999.
    • I. Mavridis, G. Pangalos, and M. Khair. eMEDAC: Role-based access control supporting discretionary and mandatory features. In 13th IFIP WG 11.3 Working Conference on Database Security, 1999.
  • 15
    • 0002779304 scopus 로고    scopus 로고
    • Privacy, information technology, and health care
    • August
    • T. Rindfleisch. Privacy, information technology, and health care. Communications of the ACM, 40(8):93-100, August 1997.
    • (1997) Communications of the ACM , vol.40 , Issue.8 , pp. 93-100
    • Rindfleisch, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.