메뉴 건너뛰기




Volumn 29, Issue , 2010, Pages 909-912

Multilevel access control in hospital information systems

Author keywords

access control; EHR encryption; electronic medical record; medical data privacy

Indexed keywords

CRYPTOGRAPHIC TECHNIQUES; EHR ENCRYPTION; ELECTRONIC MEDICAL RECORD; ENCRYPTION KEY; HEALTH RECORDS; HIERARCHICAL ACCESS CONTROL; HOSPITAL INFORMATION SYSTEMS; MANAGEMENT SYSTEMS; MEDICAL COMPANIES; MEDICAL DATA; MEDICAL HEALTH; MEDICAL INFORMATION; MEDICAL RECORD; MULTILEVEL ACCESS; RESEARCH GROUPS;

EID: 77957559026     PISSN: 16800737     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-642-13039-7_230     Document Type: Conference Paper
Times cited : (3)

References (12)
  • 1
    • 40549129015 scopus 로고    scopus 로고
    • Access control requirements for processing electronic health records
    • Alhaqbani Bandar, Fidge Colin. Access Control Requirements for Processing Electronic Health Records Business Process Management Workshops. 2008:371-382.
    • (2008) Business Process Management Workshops , pp. 371-382
    • Bandar, A.1    Colin, F.2
  • 2
    • 70350359475 scopus 로고    scopus 로고
    • Electronic health record as a knowledge management tool in the scope of health
    • Montero Miguel, Prado Susana. Electronic Health Record as a Knowledge Management Tool in the Scope of Health Knowledge Management for Health Care Procedures. 2009:152-166.
    • (2009) Knowledge Management for Health Care Procedures , pp. 152-166
    • Miguel, M.1    Susana, P.2
  • 3
    • 33947621113 scopus 로고    scopus 로고
    • Securing electronic health records without impeding the flow of information
    • Agrawal R., Johnson C. Securing electronic health records without impeding the flow of information International Journal of Medical Informatics. 2007;76:471-479.
    • (2007) International Journal of Medical Informatics , vol.76 , pp. 471-479
    • Agrawal, R.1    Johnson, C.2
  • 4
    • 0031525484 scopus 로고    scopus 로고
    • The adequacy of privacy: The european union data protection directive and the North American response
    • Bennett C. J., Raab C. D. The Adequacy of Privacy: The European Union Data Protection Directive and the North American Response Information society. 1997;13:245-263.
    • (1997) Information Society , vol.13 , pp. 245-263
    • Bennett, C.J.1    Raab, C.D.2
  • 5
  • 9
    • 84908882813 scopus 로고    scopus 로고
    • A flexible role-based access control model for multimedia medical image database systems
    • Tzelepi Sofia, Pangalos George. A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems Information Security. 2001:335-346.
    • (2001) Information Security , pp. 335-346
    • Sofia, T.1    George, P.2
  • 11
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl Selim G., Taylor Peter D. Cryptographic solution to a problem of access control in a hierarchy ACM Trans. Comput. Syst. 1983;1:239-248.
    • (1983) ACM Trans. Comput. Syst. , vol.1 , pp. 239-248
    • Akl Selim, G.1    Taylor Peter, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.