메뉴 건너뛰기




Volumn 27, Issue 3, 2002, Pages 185-201

Implementing context and team based access control in healthcare intranets

Author keywords

Access control; Active security; Attribute certificates; Contexts; Information systems security; Teams

Indexed keywords

ACCESS TO INFORMATION; ARTICLE; COMPUTER MODEL; COMPUTER PROGRAM; COMPUTER SECURITY; COMPUTER SYSTEM; DATA BASE; HEALTH CARE SYSTEM; HUMAN; HUMAN COMPUTER INTERACTION; INTRANET; MEDICAL INFORMATION SYSTEM; PRIVACY;

EID: 80051743310     PISSN: 14639238     EISSN: None     Source Type: Journal    
DOI: 10.1080/1463923021000042715     Document Type: Article
Times cited : (11)

References (20)
  • 1
    • 0011965429 scopus 로고    scopus 로고
    • The System Integration (SI) Challenge in Health Care
    • Vol. 6
    • GRIMSON, J., GRIMSON, W., and HASSELBRING W., 2000, The System Integration (SI) Challenge in Health Care, Communications of the ACM, 43, 49-55, Vol. 6.
    • (2000) Communications of the ACM , vol.43 , pp. 49-55
    • Grimson, J.1    Grimson, W.2    Hasselbring, W.3
  • 6
    • 0033652039 scopus 로고    scopus 로고
    • The NIST Model for Role-Based Access Control: Towards A Unified Standard
    • Technical University of Berlin, Berlin, Germany. July 2000
    • SANDHU, R., FERRAIOLO, D., and KUHN, R., 2000, The NIST Model for Role-Based Access Control: Towards A Unified Standard, Proceedings of the Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Technical University of Berlin, Berlin, Germany. July 2000, pp. 47-63.
    • (2000) Proceedings of the Fifth ACM Workshop on Role-Based Access Control, RBAC 2000 , pp. 47-63
    • Sandhu, R.1    Ferraiolo, D.2    Kuhn, R.3
  • 7
    • 0031387996 scopus 로고    scopus 로고
    • Team-Based Access Control (TMAC): A Primitive for Applying Role-Based Access Controls in Collaborative Environments
    • Fairfax, VA USA. November 1997
    • THOMAS, R. K., 1997, Team-Based Access Control (TMAC): A Primitive for Applying Role-Based Access Controls in Collaborative Environments, Proceedings of the Second ACM Workshop on Role-Based Access Control, RBAC 97, Fairfax, VA USA. November 1997, pp. 13-19.
    • (1997) Proceedings of the Second ACM Workshop on Role-Based Access Control, RBAC 97 , pp. 13-19
    • Thomas, R.K.1
  • 9
    • 19344364618 scopus 로고    scopus 로고
    • Role-based Access Control
    • Academic Press 1998
    • SANDHU, R., 1998, Role-based Access Control, Advances in Computers, 46n Academic Press, 1998.
    • (1998) Advances in Computers , vol.46 N
    • Sandhu, R.1
  • 11
    • 0012074370 scopus 로고    scopus 로고
    • An Analysis of Distributed Network Security Services: Kerberos and Public Key Infrastructure (PKI)
    • Guardent Inc. (white paper), Cisco World magazine April 2001
    • HYNES, M., 2001, An Analysis of Distributed Network Security Services: Kerberos and Public Key Infrastructure (PKI), Guardent Inc. (white paper), Cisco World magazine, April 2001, http:// www.ciscoworldmagazine.com/webpapers/2001/04_guardent.shtml
    • (2001)
    • Hynes, M.1
  • 12
    • 0012101654 scopus 로고    scopus 로고
    • UML, Unified Modelling Language Notation Guide version 1.1, Rational, Software Corporation, September 1997
    • UML, 1997, Unified Modelling Language Notation Guide version 1.1, Rational Software Corporation, September 1997, http://www.rational.com/uml
    • (1997)
  • 13
  • 14
    • 0003900680 scopus 로고    scopus 로고
    • Internet X.509 Public Key Infrastructure PXIX Roadmap
    • IETF Group, Internet Draft: draft.ietf.pkix.roadmap-06.txt, work in progress, November 2000
    • ARSENAULT, A., and TURNER, S., 2000, Internet X.509 Public Key Infrastructure PXIX Roadmap, IETF Group, Internet Draft: draft.ietf.pkix.roadmap-06.txt, work in progress, November 2000, http://www.ietf.org/shadow.html
    • (2000)
    • Arsenault, A.1    Turner, S.2
  • 15
    • 0003686066 scopus 로고    scopus 로고
    • An Internet Attribute Certificate Profile for Authorization
    • IETF Group, Internet Draft: draft.ietf.pkix.ac509prof-09.txt, work in progress, June 2001
    • FARREL, S., and HOUSLEY, R., 2001, An Internet Attribute Certificate Profile for Authorization, IETF Group, Internet Draft: draft.ietf.pkix.ac509prof-09.txt, work in progress, June 2001, http:// www.ietf.org/shadow.html
    • (2001)
    • Farrel, S.1    Housley, R.2
  • 16
    • 0012077289 scopus 로고    scopus 로고
    • Attribute Certification: An Enabling Technology for Delegation and Role-Based Controls in Distributed Environments
    • Fairfax, VA, USA. October 1999
    • LINN, J., and NYSTROM, M, 1999, Attribute Certification: An Enabling Technology for Delegation and Role-Based Controls in Distributed Environments, Proceedings of the Forth ACM Workshop on Role-Based Access Control, RBAC'99, Fairfax, VA, USA. October 1999, pp. 121-129.
    • (1999) Proceedings of the Forth ACM Workshop on Role-Based Access Control, RBAC'99 , pp. 121-129
    • Linn, J.1    Nystrom, M.2
  • 17
    • 0012044580 scopus 로고    scopus 로고
    • OAS, Oracle Application Server Administration Guide (A60172-01). Oracle Application Server 4.0 Documentation Set, Oracle Corporation
    • OAS, 1999, Oracle Application Server Administration Guide (A60172-01), Oracle Application Server 4.0 Documentation Set, Oracle Corporation.
    • (1999)
  • 19
  • 20
    • 0012097521 scopus 로고    scopus 로고
    • WTR, Oracle PL/SQL Web Toolkit Reference (A60123-01), Release 4.0, Oracle Corporation
    • WTR, 1999, Oracle PL/SQL Web Toolkit Reference (A60123-01), Release 4.0, Oracle Corporation.
    • (1999)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.