메뉴 건너뛰기




Volumn , Issue , 2007, Pages 226-233

Role based access control for a medical database

Author keywords

Authorization; Medical database; NHS; RBAC

Indexed keywords

APPLICATION PROGRAMS; DATABASE SYSTEMS; HOSPITAL DATA PROCESSING; MEDICAL COMPUTING; SOFTWARE ENGINEERING;

EID: 77957580896     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (60)
  • 1
    • 1842739487 scopus 로고    scopus 로고
    • Lessons from the central hampshire electronic health record pilot project: Issues of data protection and consent
    • Apr
    • T. Adams, M. Budden, C. Hoare, and H. Sanderson, "Lessons from the Central Hampshire Electronic Health Record Pilot Project: Issues of Data Protection and Consent, " BMJ, vol. 328, pp. 871-874, Apr. 2004.
    • (2004) BMJ , vol.328 , pp. 871-874
    • Adams, T.1    Budden, M.2    Hoare, C.3    Sanderson, H.4
  • 2
    • 0042834000 scopus 로고    scopus 로고
    • Security issues for implementation of e-medical records
    • Sept
    • T. Huston, "Security Issues for implementation of E-Medical Records, " Communications of ACM, vol. 44, no. 9, pp. 89-94, Sept. 2001.
    • (2001) Communications of ACM , vol.44 , Issue.9 , pp. 89-94
    • Huston, T.1
  • 3
    • 25144515646 scopus 로고    scopus 로고
    • Managing hospital databases: Can large hospitals really protect patient data
    • Sept
    • R. Lederman, "Managing Hospital Databases: Can Large Hospitals Really Protect Patient Data, " Health Informatics Journal, vol. 11, no. 3, pp. 201-210, Sept. 2005.
    • (2005) Health Informatics Journal , vol.11 , Issue.3 , pp. 201-210
    • Lederman, R.1
  • 4
    • 0030086382 scopus 로고    scopus 로고
    • Role based access control models
    • Feb
    • R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role Based Access Control Models, " IEEE Computer, vol. 29, no 2, pp. 38-47, Feb. 1996.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 8
    • 0000052619 scopus 로고    scopus 로고
    • Authentication, access control and audit
    • Mar
    • R. Sandhu, and P. Samarati, "Authentication, Access Control and Audit, " ACM Computing Surveys, vol. 28, no. 1, pp. 241-243, Mar. 1996.
    • (1996) ACM Computing Surveys , vol.28 , Issue.1 , pp. 241-243
    • Sandhu, R.1    Samarati, P.2
  • 9
    • 0020779363 scopus 로고
    • Inference controls for statistical databases
    • D. E. Denning, and J. Schlörer, "Inference Controls for Statistical Databases, " IEEE Computer journal, vol. 16, no. 7, pp. 69-82, 1983.
    • (1983) IEEE Computer Journal , vol.16 , Issue.7 , pp. 69-82
    • Denning, D.E.1    Schlörer, J.2
  • 11
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • T. F. Lunt, "A Survey of Intrusion Detection Techniques, " Computers and Security, vol. 12, no. 4, pp. 405-418, 1993.
    • (1993) Computers and Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1
  • 15
    • 0000826543 scopus 로고
    • Negation as failure
    • H. Gallaire and J. Minker, Eds. New York: Plenum Press
    • K. Clark, "Negation as Failure", in Logic and Databases, H. Gallaire and J. Minker, Eds. New York: Plenum Press, 1978, pp. 293-322.
    • (1978) Logic and Databases , pp. 293-322
    • Clark, K.1
  • 17
    • 30644464563 scopus 로고    scopus 로고
    • Rule support for role based access control
    • A. Kern, and C. Walhorn, "Rule Support for Role Based Access Control, " in 2005 Proc. ACM SACMAT Conf., pp. 130-138.
    • 2005 Proc ACM SACMAT Conf. , pp. 130-138
    • Kern, A.1    Walhorn, C.2
  • 18
    • 0002045898 scopus 로고    scopus 로고
    • The ARBAC97 model for role-based administration of roles: Preliminary description and outline
    • R. Sandhu, V. Bhamidipati, R. Coyne, S. Ganta, and C. Youman, "The ARBAC97 Model for Role-Based Administration of Roles: Preliminary Description and Outline, " IEEE Computer, vol. 29, no. 2, pp. 38-47, 1997.
    • (1997) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Bhamidipati, V.2    Coyne, R.3    Ganta, S.4    Youman, C.5
  • 20
    • 4243280162 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Gaithersburg, MD TRI Project Number 07007.012
    • M. P. Gallaher, A. C. O'Connor, and B. Kropp, "The Economic Impact of RBAC, " National Institute of Standards and Technology, Gaithersburg, MD TRI Project Number 07007.012, 2002.
    • (2002) The Economic Impact of RBAC
    • Gallaher, M.P.1    O'Connor, A.C.2    Kropp, B.3
  • 24
    • 0031387996 scopus 로고    scopus 로고
    • Team-based access control: A primitive for applying role-based access controls in collaborative environments
    • R. K. Thomas, "Team-Based Access Control: A Primitive for Applying Role-Based Access Controls in Collaborative Environments, " in 1997 Proc. ACM Workshop on Role-Based Access Control, pp. 13-19.
    • 1997 Proc ACM Workshop on Role-Based Access Control , pp. 13-19
    • Thomas, R.K.1
  • 25
    • 84976216919 scopus 로고    scopus 로고
    • Task-based authorization control: A family of models for active and enterprise oriented authorization management
    • R. K. Thomas, R. S. Sandhu, "Task-Based Authorization Control: A Family of models for Active and Enterprise Oriented Authorization Management, " in 1997 Proc. IFIP WG11.3 Workshop on DB Security.
    • 1997 Proc. IFIP WG11.3 Workshop on DB Security
    • Thomas, R.K.1    Sandhu, R.S.2
  • 26
    • 0242456746 scopus 로고    scopus 로고
    • A role based delegation framework for healthcare information systems
    • L. Zhang, G. J. Ahn, B. T. Chu, "A Role Based Delegation Framework for Healthcare Information Systems, " in 2002 Proc. ACM SACMAT, pp. 125-134.
    • 2002 Proc ACM SACMAT , pp. 125-134
    • Zhang, L.1    Ahn, G.J.2    Chu, B.T.3
  • 27
    • 0001599027 scopus 로고
    • On the declarative semantics of deductive databases and logic programming
    • J. Minker, Ed. Morgan- Kaufmann
    • T. Przymusinski, "On the Declarative Semantics of Deductive Databases and Logic Programming, " in Foundations of Deductive Databases and Logic Programming, J. Minker, Ed. Morgan- Kaufmann, 1988, pp. 193-216.
    • (1988) Foundations of Deductive Databases and Logic Programming , pp. 193-216
    • Przymusinski, T.1
  • 29
    • 84907108567 scopus 로고
    • Design and implementation of secure medical database systems
    • G. Pangalos, "Design and Implementation of Secure Medical Database Systems, " Journal of Medical Informatics, vol. 20, no. 3, pp. 265-277, 1995.
    • (1995) Journal of Medical Informatics , vol.20 , Issue.3 , pp. 265-277
    • Pangalos, G.1
  • 31
    • 3042584122 scopus 로고    scopus 로고
    • Flexible access control policy specification with constraint logic programming
    • Nov
    • S. Barker, and P. Stuckey, "Flexible Access Control Policy Specification with Constraint Logic Programming, " ACM Transactions on Information and Systems Security, vol. 6, no. 4, pp. 501-546, Nov. 2003.
    • (2003) ACM Transactions on Information and Systems Security , vol.6 , Issue.4 , pp. 501-546
    • Barker, S.1    Stuckey, P.2
  • 33
    • 24344501341 scopus 로고    scopus 로고
    • Access control in collaborative systems
    • Mar
    • V. Tolone, G. J. Ahn, and T. Pai, "Access Control in Collaborative Systems, " ACM Computing Survey, vol. 37, no. 1, pp. 29-41, Mar. 2005.
    • (2005) ACM Computing Survey , vol.37 , Issue.1 , pp. 29-41
    • Tolone, V.1    Ahn, G.J.2    Pai, T.3
  • 34
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate intranet
    • Feb
    • D. Ferraiolo, F. Barkley, and R. Kuhn, "A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet, " ACM Transactions on Information and Systems Security, vol. 2, no. 1, pp. 24-64, Feb. 1999.
    • (1999) ACM Transactions on Information and Systems Security , vol.2 , Issue.1 , pp. 24-64
    • Ferraiolo, D.1    Barkley, F.2    Kuhn, R.3
  • 35
    • 23244445557 scopus 로고    scopus 로고
    • X-GTRBAC: An XML-Based policy specification framework and architecture for enterprise-wide access control
    • May
    • R. Bhatti, A. Ghafoor, and E. Bertino, "X-GTRBAC: An XML-Based Policy Specification Framework and Architecture for Enterprise-Wide Access Control, " ACM Transactions on Information and System Security, vol. 8, no. 2, pp. 187-227, May 2005.
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.2 , pp. 187-227
    • Bhatti, R.1    Ghafoor, A.2    Bertino, E.3
  • 36
    • 33644540471 scopus 로고    scopus 로고
    • SmartGate: A smart push- pull approach to support role based security in web gateways
    • R. Adaikkalavan, and S. Chakravarthy, "SmartGate: A Smart Push- Pull Approach to Support Role Based Security in Web Gateways, " in 2005 Proc. SAC, pp. 1727-1731.
    • 2005 Proc. SAC , pp. 1727-1731
    • Adaikkalavan, R.1    Chakravarthy, S.2
  • 37
    • 4444246080 scopus 로고    scopus 로고
    • An integrated approach to engineer and enforce context constraints in RBAC environments
    • Aug
    • M. Strembeck and G. Neumann, "An Integrated Approach to Engineer and Enforce Context Constraints in RBAC Environments, " ACM Transactions on Information and System Security, vol. 7(3) pp. 392-427, Aug. 2004.
    • (2004) ACM Transactions on Information and System Security , vol.7 , Issue.3 , pp. 392-427
    • Strembeck, M.1    Neumann, G.2
  • 38
    • 24644475493 scopus 로고    scopus 로고
    • Implementing role based access control for federated information systems on the web
    • K. Taylor, J. Murty, "Implementing Role Based Access Control for Federated Information Systems on the Web, " in 2003 Proc. AISW, pp. 87-95.
    • 2003 Proc. AISW , pp. 87-95
    • Taylor, K.1    Murty, J.2
  • 39
    • 84865788031 scopus 로고    scopus 로고
    • A model of oasis role-based access control and its support for active security
    • Nov
    • J. Bacon, K. Moodu, W. Yao, "A Model of OASIS Role-Based Access Control and its Support for Active Security, " ACM Transaction on Information System Security, vol. 5, no. 4, pp. 492- 540, Nov. 2002.
    • (2002) ACM Transaction on Information System Security , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moodu, K.2    Yao, W.3
  • 40
    • 84932413875 scopus 로고
    • Ensuring patient data privacy, confidentiality and security
    • July
    • L. R. Simpson, "Ensuring Patient Data Privacy, Confidentiality and Security, " Nursing Management, vol. 25, no. 7, pp. 18-20, July 1994.
    • (1994) Nursing Management , vol.25 , Issue.7 , pp. 18-20
    • Simpson, L.R.1
  • 41
    • 84895301585 scopus 로고    scopus 로고
    • Data Protection Act, Available: http://www.opsi.gov.uk/acts/acts1998/19980029.htm
    • Data Protection Act
  • 44
    • 0033646048 scopus 로고    scopus 로고
    • A model of accountability, confidentiality and override for healthcare and other applications
    • J. Longstaff, M. Lockyer, J. Nicholas, "A Model of Accountability, Confidentiality and Override for Healthcare and Other Applications, " in 2000 Proc. ACM Workshop on RBAC, pp. 71-76.
    • 2000 Proc ACM Workshop on RBAC , pp. 71-76
    • Longstaff, J.1    Lockyer, M.2    Nicholas, J.3
  • 46
    • 84976229360 scopus 로고    scopus 로고
    • Distributed communications methods and role-based access control for use in healthcare applications
    • J. Poole, J. Barkley, K. Brady, A. Cincotta, W. Salamon, "Distributed Communications methods and Role-Based Access Control for use in Healthcare Applications, " in 1995 Proc. CHIN Summit.
    • 1995 Proc. CHIN Summit
    • Poole, J.1    Barkley, J.2    Brady, K.3    Cincotta, A.4    Salamon, W.5
  • 47
    • 3242684510 scopus 로고    scopus 로고
    • Access control based on attribute certificates for medical intranet applications
    • Mar
    • I. Mavridis, C. Georgiadis, G. Pangalos, M. and Khair, "Access Control Based on Attribute Certificates for Medical Intranet Applications, " Journal of Medical Internet Research, vol. 3, no. 1, e9, Mar. 2001.
    • (2001) Journal of Medical Internet Research , vol.3 , Issue.1 , pp. e9
    • Mavridis, I.1    Georgiadis, C.2    Pangalos, M.3    Khair, G.4
  • 49
    • 0242709331 scopus 로고    scopus 로고
    • A context based authorization and access control method based on rbac: A case study from heath care domain
    • M. Wilikens, S. Feriti, A. Sanna, M. Masera, 2002, "A Context Based Authorization and Access Control Method Based on RBAC: A Case Study from Heath Care Domain, " in 2002 Proc. ACM SACMAT, pp. 117-124.
    • (2002) 2002 Proc. ACM SACMAT , pp. 117-124
    • Wilikens, M.1    Feriti, S.2    Sanna, A.3    Masera, M.4
  • 50
    • 33644533495 scopus 로고    scopus 로고
    • Formal specification of role based security policies for clinical information systems
    • K. Sohr, M. Drouineaud, G. J. Ahn, "Formal Specification of Role Based Security Policies for Clinical Information Systems, " in 2005 Proc. SAC, pp. 332-339.
    • 2005 Proc. SAC , pp. 332-339
    • Sohr, K.1    Drouineaud, M.2    Ahn, G.J.3
  • 52
    • 84976216907 scopus 로고    scopus 로고
    • ORACLE, Available: http://www.oracle.com/database/index.html
    • ORACLE Available
  • 53
    • 84976212467 scopus 로고    scopus 로고
    • SAP, Available: http://www.sap.com/index.epx
    • SAP Available
  • 57
    • 84976243657 scopus 로고    scopus 로고
    • J2EE, Available: http://java.sun.com/javaee/index.jsp
    • J2EE Available
  • 58
    • 30644473628 scopus 로고    scopus 로고
    • Future directions of access control models, rchitectures and technologies
    • K. Beznosov, "Future Directions of Access Control Models, rchitectures and Technologies, " in 2005 Proc. ACM SACMAT, pp. 8.
    • 2005 Proc ACM SACMAT , pp. 8
    • Beznosov, K.1
  • 59
    • 84960914217 scopus 로고    scopus 로고
    • Enterprise model as a basis of administration on role-based access control
    • S. Oh and S. Park, "Enterprise model as a Basis of Administration on Role-based Access Control, " in 2001 Proc. SACMAT, pp. 150-158.
    • 2001 Proc. SACMAT , pp. 150-158
    • Oh, S.1    Park, S.2
  • 60
    • 0242540373 scopus 로고    scopus 로고
    • The tees confidentiality model: An authorization model for identities and roles
    • J. J. Longstaff, M. A. Lockyer, J. Nicholas, "The Tees Confidentiality Model: An Authorization Model for Identities and Roles, " in 2003 Proc. ACM SACMAT, pp. 125-133.
    • 2003 Proc. ACM SACMAT , pp. 125-133
    • Longstaff, J.J.1    Lockyer, M.A.2    Nicholas, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.