메뉴 건너뛰기




Volumn , Issue , 2011, Pages 247-251

Ensuring access control in cloud provisioned healthcare systems

Author keywords

Access control; Cloud computing; eHealth

Indexed keywords

AUTHORIZED USERS; CLOUD SYSTEMS; EHEALTH; HEALTH-CARE SYSTEM; INSURANCE COMPANIES; LEAST PRIVILEGE; MULTI TENANTS; SENSITIVE INFORMATIONS; SEPARATION OF DUTY;

EID: 79957927304     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CCNC.2011.5766466     Document Type: Conference Paper
Times cited : (62)

References (19)
  • 1
    • 79957907619 scopus 로고    scopus 로고
    • http://ec2-184-72-45-148.us-west-1.compute.amazonaws.com/CloudWebProject/ Login.jsp
  • 2
    • 84885573531 scopus 로고    scopus 로고
    • "Amazon EC2", Available at: http://aws.amazon.com/ec2
    • Amazon EC2
  • 6
    • 84949747356 scopus 로고    scopus 로고
    • An authorization model for workflows
    • V. Atluri and W.-K. Huang. "An authorization model for workflows". In proc. of the ESORIC 1996, LNCS1146, pages 44-64, September 1996. (Pubitemid 126128893)
    • (1996) Lecture Notes in Computer Science , Issue.1146 , pp. 44-64
    • Atluri, V.1    Huang, W.-K.2
  • 10
    • 39049126192 scopus 로고    scopus 로고
    • A study of access control requirements for healthcare systems based on audit trails from access logs
    • Miami, Florida, December
    • O. Edsberg and L. Røstad, "A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs", In Proc. of 22nd Annual Computer Security Applications Conference, Miami, Florida, December, 2006.
    • (2006) Proc. of 22nd Annual Computer Security Applications Conference
    • Edsberg, O.1    Røstad, L.2
  • 13
    • 34547700615 scopus 로고    scopus 로고
    • RTFW: An access control model for workflow environment
    • 10th International Conference on May
    • Hao Jiang, Shengye Lu, "RTFW: An Access Control Model for Workflow Environment", Computer Supported Cooperative Work in Design, 10th International Conference on, May 2006.
    • (2006) Computer Supported Cooperative Work in Design
    • Jiang, H.1    Lu, S.2
  • 15
    • 0038825675 scopus 로고    scopus 로고
    • Task-role-based access control model
    • September
    • Sejong Oh, Seog Park, "Task-Role-Based Access Control Model", Information System, September 2003.
    • (2003) Information System
    • Oh, S.1    Park, S.2
  • 17
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • Apr
    • R. Riverst, "The MD5 Message-Digest Algorithm", RFC 1321, Apr 1992.
    • (1992) RFC , vol.1321
    • Riverst, R.1
  • 18
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
    • August
    • R. S. Sandhu and R. K. Thomas, "Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management", In proceedings of the IFIP WG11.3 Workshop on Database Security, August 1997.
    • (1997) Proceedings of the IFIP WG11.3 Workshop on Database Security
    • Sandhu, R.S.1    Thomas, R.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.