메뉴 건너뛰기




Volumn 21, Issue 2, 1996, Pages 93-103

A front end authorization mechanism for hospital information systems

Author keywords

Authorization; Rule based systems; User role based security

Indexed keywords

ARTICLE; DATA BASE; HEALTH CARE SYSTEM; HOSPITAL; INFORMATION SYSTEM; MEDICAL SERVICE; ORGANIZATION;

EID: 80051969234     PISSN: 03077640     EISSN: None     Source Type: Journal    
DOI: 10.3109/14639239608995011     Document Type: Article
Times cited : (3)

References (16)
  • 2
    • 10544247870 scopus 로고
    • Design environment for a hospital information system: Meeting the data security challenge
    • K. C. Lun, P. Degoulet, T. E. Piemme and O.'Rienhoff (eds) (Amsterdam: Elsevier Science Publishers B.V. (North-Holland))
    • EICHINGER, S., and PERNUL, G. (1992) Design environment for a hospital information system: meeting the data security challenge. In Medinfo 92, K. C. Lun, P. Degoulet, T. E. Piemme and O.'Rienhoff (eds) (Amsterdam: Elsevier Science Publishers B.V. (North-Holland)), pp. 1582-1588.
    • (1992) Medinfo 92 , pp. 1582-1588
    • Eichinger, S.1    Pernul, G.2
  • 3
    • 10544226285 scopus 로고
    • Health delivery: The problem solved?
    • S. Jajodia and C. E. Landwehr (eds), (Amsterdam: North-Holland)
    • NOTARGIACOMO, L., and GRAUBART, D. (1991) Health delivery: the problem solved? In Database Security, IV: Status and Prospects, S. Jajodia and C. E. Landwehr (eds), (Amsterdam: North-Holland), pp. 13-26.
    • (1991) Database Security, IV: Status and Prospects , pp. 13-26
    • Notargiacomo, L.1    Graubart, D.2
  • 6
    • 0041667570 scopus 로고
    • Secure database development methodologies
    • C. E. Landwehr (ed.), (Amsterdam: North-Holland)
    • FUGINI, M. (1988) Secure database development methodologies. In Database Security : Status and Prospects, C. E. Landwehr (ed.), (Amsterdam: North-Holland), pp. 103-129.
    • (1988) Database Security : Status and Prospects , pp. 103-129
    • Fugini, M.1
  • 7
    • 0242528829 scopus 로고
    • A user-role based data security approach
    • C. E. Landwehr (ed.), (Amsterdam: North-Holland)
    • TING, T. (1988) A user-role based data security approach. In Database Security: Status and Prospects, C. E. Landwehr (ed.), (Amsterdam: North-Holland), pp. 187-208.
    • (1988) Database Security: Status and Prospects , pp. 187-208
    • Ting, T.1
  • 9
    • 0028374740 scopus 로고
    • An approach to authorization modelling in object-oriented database systems
    • BERTINO, E., and WEIGARD, H. (1994) An approach to authorization modelling in object-oriented database systems. Data and Knowledge Engineering, 12, 1-29.
    • (1994) Data and Knowledge Engineering , vol.12 , pp. 1-29
    • Bertino, E.1    Weigard, H.2
  • 10
    • 0242571490 scopus 로고
    • Role-based security in database management systems
    • C. E. Landwehr (ed.), (Amsterdam: North-Holland)
    • LOCHOVSKY, F., and WOO, C. (1988) Role-based security in database management systems. In Database Security: Status and Prospects, C. E. Landwehr (ed.), (Amsterdam: North-Holland), pp. 209-222.
    • (1988) Database Security: Status and Prospects , pp. 209-222
    • Lochovsky, F.1    Woo, C.2
  • 11
    • 0028715549 scopus 로고
    • Design for dynamic user-role-based security
    • MOHAMMED, I., and DILTS, D. (1994) Design for dynamic user-role-based security. Computers and Security, 13, 661-671.
    • (1994) Computers and Security , vol.13 , pp. 661-671
    • Mohammed, I.1    Dilts, D.2
  • 12
    • 0019145446 scopus 로고
    • Data base security : Requirements, policies and models
    • WOOD, C., FERNANDEZ, E. B., and SUMMERS, R. C. (1980) Data base security : requirements, policies and models. IBM Systems Journal, 19(2), 229-252.
    • (1980) IBM Systems Journal , vol.19 , Issue.2 , pp. 229-252
    • Wood, C.1    Fernandez, E.B.2    Summers, R.C.3
  • 13
    • 70350563008 scopus 로고
    • Interfacing Relational Databases and Prolog Efficiently
    • L. Kerschberg (ed.), (California: Benjamin Cummings Publishing Co)
    • CERI, S., GOTTLOB, G., and WIEDERHOLD, G. (1987) Interfacing Relational Databases and Prolog Efficiently. Expert Database Systems, L. Kerschberg (ed.), (California: Benjamin Cummings Publishing Co), pp. 207-223.
    • (1987) Expert Database Systems , pp. 207-223
    • Ceri, S.1    Gottlob, G.2    Wiederhold, G.3
  • 14
    • 0025586655 scopus 로고
    • Combining Prolog with an RDBMS for applications in software configuration management
    • S. Deen and G. Thomas (eds) (London: Pitman)
    • FARRIS, C., and SINGLETON, P. (1989) Combining Prolog with an RDBMS for applications in software configuration management. In Proceedings of the Working Conference on Data and Knowledge Base Integration, S. Deen and G. Thomas (eds) (London: Pitman), pp. 169-180.
    • (1989) Proceedings of the Working Conference on Data and Knowledge Base Integration , pp. 169-180
    • Farris, C.1    Singleton, P.2
  • 15
    • 0029340990 scopus 로고
    • Architectures and monitoring techniques for active databases: An evaluation
    • CHAKRAVARTHY, S. (1995) Architectures and monitoring techniques for active databases: An evaluation. Data and Knowledge Engineering, 16, 1-26.
    • (1995) Data and Knowledge Engineering , vol.16 , pp. 1-26
    • Chakravarthy, S.1
  • 16
    • 0026261259 scopus 로고
    • Design aspects of access control in a knowledge base system
    • STEINKE, G. (1991) Design aspects of access control in a knowledge base system. Computers and Security, 10, 612-625.
    • (1991) Computers and Security , vol.10 , pp. 612-625
    • Steinke, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.