-
1
-
-
1842739487
-
Lessons from the central hampshire electronic health record pilot project: Issues of data protection and consent
-
Apr
-
T. Adams, M. Budden, C. Hoare, and H. Sanderson, "Lessons from the Central Hampshire Electronic Health Record Pilot Project: Issues of Data Protection and Consent, " BMJ, vol. 328, pp. 871-874, Apr. 2004.
-
(2004)
BMJ
, vol.328
, pp. 871-874
-
-
Adams, T.1
Budden, M.2
Hoare, C.3
Sanderson, H.4
-
2
-
-
0042834000
-
Security issues for implementation of e-medical records
-
Sept
-
T. Huston, "Security Issues for implementation of E-Medical Records, " Communications of ACM, vol. 44, no. 9, pp. 89-94, Sept. 2001.
-
(2001)
Communications of ACM
, vol.44
, Issue.9
, pp. 89-94
-
-
Huston, T.1
-
3
-
-
25144515646
-
Managing hospital databases: Can large hospitals really protect patient data
-
Sept
-
R. Lederman, "Managing Hospital Databases: Can Large Hospitals Really Protect Patient Data, " Health Informatics Journal, vol. 11, no. 3, pp. 201-210, Sept. 2005.
-
(2005)
Health Informatics Journal
, vol.11
, Issue.3
, pp. 201-210
-
-
Lederman, R.1
-
4
-
-
0030086382
-
Role based access control models
-
Feb
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role Based Access Control Models, " IEEE Computer, vol. 29, no 2, pp. 38-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
8
-
-
0000052619
-
Authentication, access control and audit
-
Mar
-
R. Sandhu, and P. Samarati, "Authentication, Access Control and Audit, " ACM Computing Surveys, vol. 28, no. 1, pp. 241-243, Mar. 1996.
-
(1996)
ACM Computing Surveys
, vol.28
, Issue.1
, pp. 241-243
-
-
Sandhu, R.1
Samarati, P.2
-
9
-
-
0020779363
-
Inference controls for statistical databases
-
D. E. Denning, and J. Schlörer, "Inference Controls for Statistical Databases, " IEEE Computer journal, vol. 16, no. 7, pp. 69-82, 1983.
-
(1983)
IEEE Computer Journal
, vol.16
, Issue.7
, pp. 69-82
-
-
Denning, D.E.1
Schlörer, J.2
-
11
-
-
0027609384
-
A survey of intrusion detection techniques
-
T. F. Lunt, "A Survey of Intrusion Detection Techniques, " Computers and Security, vol. 12, no. 4, pp. 405-418, 1993.
-
(1993)
Computers and Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
-
12
-
-
0004190705
-
-
Addison-Wesley
-
S. Castano, M. Fugini, G. Martella, and P. Samarati, Database Security, Addison-Wesley, 1995.
-
(1995)
Database Security
-
-
Castano, S.1
Fugini, M.2
Martella, G.3
Samarati, P.4
-
14
-
-
84962248491
-
Seraphim: Building dynamic interoperable security architecture for active networks
-
R. H. Campbell, Z. Liu, M. D. Mickunas, P. Naldurg, and S. Yi, "Seraphim: Building Dynamic Interoperable Security Architecture For Active Networks", in 2000 Proc. IEEE OPENARCH Conf., pp. 55-64.
-
2000 Proc. IEEE OPENARCH Conf.
, pp. 55-64
-
-
Campbell, R.H.1
Liu, Z.2
Mickunas, M.D.3
Naldurg, P.4
Yi, S.5
-
15
-
-
0000826543
-
Negation as failure
-
H. Gallaire and J. Minker, Eds. New York: Plenum Press
-
K. Clark, "Negation as Failure", in Logic and Databases, H. Gallaire and J. Minker, Eds. New York: Plenum Press, 1978, pp. 293-322.
-
(1978)
Logic and Databases
, pp. 293-322
-
-
Clark, K.1
-
17
-
-
30644464563
-
Rule support for role based access control
-
A. Kern, and C. Walhorn, "Rule Support for Role Based Access Control, " in 2005 Proc. ACM SACMAT Conf., pp. 130-138.
-
2005 Proc ACM SACMAT Conf.
, pp. 130-138
-
-
Kern, A.1
Walhorn, C.2
-
18
-
-
0002045898
-
The ARBAC97 model for role-based administration of roles: Preliminary description and outline
-
R. Sandhu, V. Bhamidipati, R. Coyne, S. Ganta, and C. Youman, "The ARBAC97 Model for Role-Based Administration of Roles: Preliminary Description and Outline, " IEEE Computer, vol. 29, no. 2, pp. 38-47, 1997.
-
(1997)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Bhamidipati, V.2
Coyne, R.3
Ganta, S.4
Youman, C.5
-
19
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Aug
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kyhn, and R. Chandramouli, "Proposed NIST Standard for Role-Based Access Control, " ACM Trans. on Information Systems Security, 4(3) pp. 224-274 Aug. 2001.
-
(2001)
ACM Trans. on Information Systems Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kyhn, D.R.4
Chandramouli, R.5
-
20
-
-
4243280162
-
-
National Institute of Standards and Technology, Gaithersburg, MD TRI Project Number 07007.012
-
M. P. Gallaher, A. C. O'Connor, and B. Kropp, "The Economic Impact of RBAC, " National Institute of Standards and Technology, Gaithersburg, MD TRI Project Number 07007.012, 2002.
-
(2002)
The Economic Impact of RBAC
-
-
Gallaher, M.P.1
O'Connor, A.C.2
Kropp, B.3
-
21
-
-
0029423187
-
A policy based role framework for access control
-
E. C. Lupu, D. A. Marriott, M. S. Sloman, and N. Yialelis, "A Policy Based Role Framework for Access Control, " in 1996 Proc. ACM SACMAT Workshop on RBAC, article no. 11.
-
1996 Proc ACM SACMAT Workshop on RBAC, Article No. 11
-
-
Lupu, E.C.1
Marriott, D.A.2
Sloman, M.S.3
Yialelis, N.4
-
23
-
-
84959042266
-
-
SUNY at Stony Brook, New York, NY Technical Report
-
T. Swift, and D. S. Warren, "XSB Performance Measurement, " SUNY at Stony Brook, New York, NY Technical Report, 1993.
-
(1993)
XSB Performance Measurement
-
-
Swift, T.1
Warren, D.S.2
-
24
-
-
0031387996
-
Team-based access control: A primitive for applying role-based access controls in collaborative environments
-
R. K. Thomas, "Team-Based Access Control: A Primitive for Applying Role-Based Access Controls in Collaborative Environments, " in 1997 Proc. ACM Workshop on Role-Based Access Control, pp. 13-19.
-
1997 Proc ACM Workshop on Role-Based Access Control
, pp. 13-19
-
-
Thomas, R.K.1
-
25
-
-
84976216919
-
Task-based authorization control: A family of models for active and enterprise oriented authorization management
-
R. K. Thomas, R. S. Sandhu, "Task-Based Authorization Control: A Family of models for Active and Enterprise Oriented Authorization Management, " in 1997 Proc. IFIP WG11.3 Workshop on DB Security.
-
1997 Proc. IFIP WG11.3 Workshop on DB Security
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
26
-
-
0242456746
-
A role based delegation framework for healthcare information systems
-
L. Zhang, G. J. Ahn, B. T. Chu, "A Role Based Delegation Framework for Healthcare Information Systems, " in 2002 Proc. ACM SACMAT, pp. 125-134.
-
2002 Proc ACM SACMAT
, pp. 125-134
-
-
Zhang, L.1
Ahn, G.J.2
Chu, B.T.3
-
27
-
-
0001599027
-
On the declarative semantics of deductive databases and logic programming
-
J. Minker, Ed. Morgan- Kaufmann
-
T. Przymusinski, "On the Declarative Semantics of Deductive Databases and Logic Programming, " in Foundations of Deductive Databases and Logic Programming, J. Minker, Ed. Morgan- Kaufmann, 1988, pp. 193-216.
-
(1988)
Foundations of Deductive Databases and Logic Programming
, pp. 193-216
-
-
Przymusinski, T.1
-
29
-
-
84907108567
-
Design and implementation of secure medical database systems
-
G. Pangalos, "Design and Implementation of Secure Medical Database Systems, " Journal of Medical Informatics, vol. 20, no. 3, pp. 265-277, 1995.
-
(1995)
Journal of Medical Informatics
, vol.20
, Issue.3
, pp. 265-277
-
-
Pangalos, G.1
-
31
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
Nov
-
S. Barker, and P. Stuckey, "Flexible Access Control Policy Specification with Constraint Logic Programming, " ACM Transactions on Information and Systems Security, vol. 6, no. 4, pp. 501-546, Nov. 2003.
-
(2003)
ACM Transactions on Information and Systems Security
, vol.6
, Issue.4
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.2
-
32
-
-
0003400251
-
-
MITRE Corp., Bedford, MA Technical Report ESD-TR-75-306
-
D. E. Bell, and L. J. LaPadula, "Secure Computer System: Unified Exposition and MULTICS Interpretation, " MITRE Corp., Bedford, MA Technical Report ESD-TR-75-306, 1975.
-
(1975)
Secure Computer System: Unified Exposition and Multics Interpretation
-
-
Bell, D.E.1
LaPadula, L.J.2
-
33
-
-
24344501341
-
Access control in collaborative systems
-
Mar
-
V. Tolone, G. J. Ahn, and T. Pai, "Access Control in Collaborative Systems, " ACM Computing Survey, vol. 37, no. 1, pp. 29-41, Mar. 2005.
-
(2005)
ACM Computing Survey
, vol.37
, Issue.1
, pp. 29-41
-
-
Tolone, V.1
Ahn, G.J.2
Pai, T.3
-
34
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
Feb
-
D. Ferraiolo, F. Barkley, and R. Kuhn, "A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet, " ACM Transactions on Information and Systems Security, vol. 2, no. 1, pp. 24-64, Feb. 1999.
-
(1999)
ACM Transactions on Information and Systems Security
, vol.2
, Issue.1
, pp. 24-64
-
-
Ferraiolo, D.1
Barkley, F.2
Kuhn, R.3
-
35
-
-
23244445557
-
X-GTRBAC: An XML-Based policy specification framework and architecture for enterprise-wide access control
-
May
-
R. Bhatti, A. Ghafoor, and E. Bertino, "X-GTRBAC: An XML-Based Policy Specification Framework and Architecture for Enterprise-Wide Access Control, " ACM Transactions on Information and System Security, vol. 8, no. 2, pp. 187-227, May 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 187-227
-
-
Bhatti, R.1
Ghafoor, A.2
Bertino, E.3
-
36
-
-
33644540471
-
SmartGate: A smart push- pull approach to support role based security in web gateways
-
R. Adaikkalavan, and S. Chakravarthy, "SmartGate: A Smart Push- Pull Approach to Support Role Based Security in Web Gateways, " in 2005 Proc. SAC, pp. 1727-1731.
-
2005 Proc. SAC
, pp. 1727-1731
-
-
Adaikkalavan, R.1
Chakravarthy, S.2
-
37
-
-
4444246080
-
An integrated approach to engineer and enforce context constraints in RBAC environments
-
Aug
-
M. Strembeck and G. Neumann, "An Integrated Approach to Engineer and Enforce Context Constraints in RBAC Environments, " ACM Transactions on Information and System Security, vol. 7(3) pp. 392-427, Aug. 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.3
, pp. 392-427
-
-
Strembeck, M.1
Neumann, G.2
-
38
-
-
24644475493
-
Implementing role based access control for federated information systems on the web
-
K. Taylor, J. Murty, "Implementing Role Based Access Control for Federated Information Systems on the Web, " in 2003 Proc. AISW, pp. 87-95.
-
2003 Proc. AISW
, pp. 87-95
-
-
Taylor, K.1
Murty, J.2
-
39
-
-
84865788031
-
A model of oasis role-based access control and its support for active security
-
Nov
-
J. Bacon, K. Moodu, W. Yao, "A Model of OASIS Role-Based Access Control and its Support for Active Security, " ACM Transaction on Information System Security, vol. 5, no. 4, pp. 492- 540, Nov. 2002.
-
(2002)
ACM Transaction on Information System Security
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moodu, K.2
Yao, W.3
-
40
-
-
84932413875
-
Ensuring patient data privacy, confidentiality and security
-
July
-
L. R. Simpson, "Ensuring Patient Data Privacy, Confidentiality and Security, " Nursing Management, vol. 25, no. 7, pp. 18-20, July 1994.
-
(1994)
Nursing Management
, vol.25
, Issue.7
, pp. 18-20
-
-
Simpson, L.R.1
-
41
-
-
84895301585
-
-
Data Protection Act, Available: http://www.opsi.gov.uk/acts/acts1998/19980029.htm
-
Data Protection Act
-
-
-
42
-
-
0242697650
-
Protecting collaboration
-
G. Wiederhold, M. Biello, V. Sarathy, X. Qian, "Protecting Collaboration, " in 1996 Proc. NISS Conf., pp. 561-569.
-
1996 Proc. NISS Conf.
, pp. 561-569
-
-
Wiederhold, G.1
Biello, M.2
Sarathy, V.3
Qian, X.4
-
44
-
-
0033646048
-
A model of accountability, confidentiality and override for healthcare and other applications
-
J. Longstaff, M. Lockyer, J. Nicholas, "A Model of Accountability, Confidentiality and Override for Healthcare and Other Applications, " in 2000 Proc. ACM Workshop on RBAC, pp. 71-76.
-
2000 Proc ACM Workshop on RBAC
, pp. 71-76
-
-
Longstaff, J.1
Lockyer, M.2
Nicholas, J.3
-
45
-
-
0034568606
-
Role-based access to patient clinical data: The intercare approach in the region of crete
-
G. Potamias, M. Tsiknakis, D. Katehakis, E. Karabela, V. Moustakis, S. Orphanoudakis, "Role-based Access to Patient Clinical Data: The InterCare Approach in the Region of Crete, " in 2000 Proc. MIE and GMDS, pp. 1074-1079.
-
2000 Proc. MIE and GMDS
, pp. 1074-1079
-
-
Potamias, G.1
Tsiknakis, M.2
Katehakis, D.3
Karabela, E.4
Moustakis, V.5
Orphanoudakis, S.6
-
46
-
-
84976229360
-
Distributed communications methods and role-based access control for use in healthcare applications
-
J. Poole, J. Barkley, K. Brady, A. Cincotta, W. Salamon, "Distributed Communications methods and Role-Based Access Control for use in Healthcare Applications, " in 1995 Proc. CHIN Summit.
-
1995 Proc. CHIN Summit
-
-
Poole, J.1
Barkley, J.2
Brady, K.3
Cincotta, A.4
Salamon, W.5
-
47
-
-
3242684510
-
Access control based on attribute certificates for medical intranet applications
-
Mar
-
I. Mavridis, C. Georgiadis, G. Pangalos, M. and Khair, "Access Control Based on Attribute Certificates for Medical Intranet Applications, " Journal of Medical Internet Research, vol. 3, no. 1, e9, Mar. 2001.
-
(2001)
Journal of Medical Internet Research
, vol.3
, Issue.1
, pp. e9
-
-
Mavridis, I.1
Georgiadis, C.2
Pangalos, M.3
Khair, G.4
-
49
-
-
0242709331
-
A context based authorization and access control method based on rbac: A case study from heath care domain
-
M. Wilikens, S. Feriti, A. Sanna, M. Masera, 2002, "A Context Based Authorization and Access Control Method Based on RBAC: A Case Study from Heath Care Domain, " in 2002 Proc. ACM SACMAT, pp. 117-124.
-
(2002)
2002 Proc. ACM SACMAT
, pp. 117-124
-
-
Wilikens, M.1
Feriti, S.2
Sanna, A.3
Masera, M.4
-
50
-
-
33644533495
-
Formal specification of role based security policies for clinical information systems
-
K. Sohr, M. Drouineaud, G. J. Ahn, "Formal Specification of Role Based Security Policies for Clinical Information Systems, " in 2005 Proc. SAC, pp. 332-339.
-
2005 Proc. SAC
, pp. 332-339
-
-
Sohr, K.1
Drouineaud, M.2
Ahn, G.J.3
-
51
-
-
84959049891
-
-
Dept of Computer Science, Stony Brook, NY, USA
-
The XSB Programmer's Manual Version 2.7.1 S. Debray, D. S. Warren, and J. Xu 2005 Dept of Computer Science, Stony Brook, NY, USA
-
(2005)
The XSB Programmer's Manual Version 2.7.1
-
-
Debray, S.1
Warren, D.S.2
Xu, J.3
-
52
-
-
84976216907
-
-
ORACLE, Available: http://www.oracle.com/database/index.html
-
ORACLE Available
-
-
-
53
-
-
84976212467
-
-
SAP, Available: http://www.sap.com/index.epx
-
SAP Available
-
-
-
57
-
-
84976243657
-
-
J2EE, Available: http://java.sun.com/javaee/index.jsp
-
J2EE Available
-
-
-
58
-
-
30644473628
-
Future directions of access control models, rchitectures and technologies
-
K. Beznosov, "Future Directions of Access Control Models, rchitectures and Technologies, " in 2005 Proc. ACM SACMAT, pp. 8.
-
2005 Proc ACM SACMAT
, pp. 8
-
-
Beznosov, K.1
-
59
-
-
84960914217
-
Enterprise model as a basis of administration on role-based access control
-
S. Oh and S. Park, "Enterprise model as a Basis of Administration on Role-based Access Control, " in 2001 Proc. SACMAT, pp. 150-158.
-
2001 Proc. SACMAT
, pp. 150-158
-
-
Oh, S.1
Park, S.2
-
60
-
-
0242540373
-
The tees confidentiality model: An authorization model for identities and roles
-
J. J. Longstaff, M. A. Lockyer, J. Nicholas, "The Tees Confidentiality Model: An Authorization Model for Identities and Roles, " in 2003 Proc. ACM SACMAT, pp. 125-133.
-
2003 Proc. ACM SACMAT
, pp. 125-133
-
-
Longstaff, J.J.1
Lockyer, M.A.2
Nicholas, J.3
|