-
1
-
-
0034315774
-
Security of the distributed electronic patient record: A case-based approach to identifying policy issues
-
Anderson, J., Security of the distributed electronic patient record: a case-based approach to identifying policy issues, International Journal of Medical Informatics, vol. 60, no. 2, pages 11-118, 2000.
-
(2000)
International Journal of Medical Informatics
, vol.60
, Issue.2
, pp. 11-118
-
-
Anderson, J.1
-
3
-
-
30644474612
-
Purpose based access control of complex data for privacy protection
-
Byun, J.-W., Bertino, E., Li, N., Purpose based access control of complex data for privacy protection, 'SACMAT'05: Proceedings of tenth ACM symposium on Access control models and technologies. ACM. New York, NY, USA, pp. 102-110, 2005.
-
(2005)
'SACMAT'05: Proceedings of Tenth ACM Symposium On Access Control Models and Technologies. ACM. New York, NY, USA
, pp. 102-110
-
-
Byun, J.-W.1
Bertino, E.2
Li, N.3
-
4
-
-
19944414458
-
Purpose-based access control for privacy protection in relational database systems
-
Purdue University
-
Byun, J.-W., Li, N., Purpose-based access control for privacy protection in relational database systems, Technical Report 2004-52. Purdue University. 2004.
-
(2004)
Technical Report 2004-52
-
-
Byun, J.-W.1
Li, N.2
-
5
-
-
24144495527
-
Towards secure xml documents with usage control
-
Cao, J., Sun, L., Wang, H., Towards secure xml documents with usage control, Lecture Notes in Computer Science, 3399, pp. 296-307, 2005.
-
(2005)
Lecture Notes In Computer Science
, vol.3399
, pp. 296-307
-
-
Cao, J.1
Sun, L.2
Wang, H.3
-
6
-
-
85001817360
-
Health insurance portability and accountability act (HIPAA) compliant access control model for web services
-
Cheng, V. S. Y., Hung, P. C. K., 2005. Health insurance portability and accountability act (HIPAA) compliant access control model for web services, International Journal of Healthcare information systems and Informatics, Vol 1, Issue 1, pp. 22-39.
-
(2005)
International Journal of Healthcare Information Systems and Informatics
, vol.1
, Issue.1
, pp. 22-39
-
-
Cheng, V.S.Y.1
Hung, P.C.K.2
-
7
-
-
85001697848
-
A finegrained access control system for xml documents
-
Damiani, E., Paraboschi, S. and Samarati, P., A finegrained access control system for xml documents, ACM Trans. Inf. Syst. Secur., 5(2):169-202, 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
Paraboschi, S.2
Samarati, P.3
-
8
-
-
84870530223
-
-
Farzad, F., Yu, E., Hung, P. C. K., Role-based access control requirements model with purpose extension, http://wer.inf.pucrio.br/WERpapers/artigos/artigos_WER0 7/Xwer07-farzad.pdf, 2007.
-
(2007)
Role-based Access Control Requirements Model With Purpose Extension
-
-
Farzad, F.1
Yu, E.2
Hung, P.C.K.3
-
11
-
-
0142151165
-
A contextual role-based access control authorization model for electronic patient record
-
Motta, G. H. M. B., Furuie, S. S., A contextual role-based access control authorization model for electronic patient record, IEEE Transactions on Information Technology in Biomedicine, vol. 7, no. 3, pages: 202-207, 2003.
-
(2003)
IEEE Transactions On Information Technology In Biomedicine
, vol.7
, Issue.3
, pp. 202-207
-
-
Motta, G.H.M.B.1
Furuie, S.S.2
-
12
-
-
0242456750
-
Towards usage control models: Beyond traditional access control
-
Park, J., Sandhu, R., Towards usage control models: beyond traditional access control, In Proceedings of the seventh ACM symposium on Access control models and technologies, ACM Press, page 57-64. 2002.
-
(2002)
Proceedings of the Seventh ACM Symposium On Access Control Models and Technologies, ACM Press
, pp. 57-64
-
-
Park, J.1
Sandhu, R.2
-
13
-
-
84949513306
-
Security architectures for controlled digital information dissemination
-
December
-
Park, J., Sandhu, R., Schifalacqua, J., Security architectures for controlled digital information dissemination, In Proceedings of 16th Annual Computer Security Application Conference, December 2003.
-
(2003)
Proceedings of 16th Annual Computer Security Application Conference
-
-
Park, J.1
Sandhu, R.2
Schifalacqua, J.3
-
14
-
-
35248873795
-
Usage control: A vision for next generation access control
-
Springer-Verlag Berlin Heideberg
-
Sandhu, R., Park, J., Usage control: A vision for next generation access control, In MMM-ACNS, 17-31, Springer-Verlag Berlin Heideberg, 2003.
-
(2003)
MMM-ACNS
, pp. 17-31
-
-
Sandhu, R.1
Park, J.2
-
15
-
-
84864270909
-
A purpose based usage access control model
-
Sun, L., Wang, H., A Purpose Based Usage Access Control Model, International Journal of Computer and Information Engineering, 4:1 2010, 44-51.
-
(2010)
International Journal of Computer and Information Engineering
, vol.4
, Issue.1
, pp. 44-51
-
-
Sun, L.1
Wang, H.2
-
16
-
-
85001720435
-
Using usage control to access xml database
-
Sun, L., Li, Y., Using usage control to access xml database, International Journal of Information Systems in the Service Sector, 32-44(1), 2008.
-
(2008)
International Journal of Information Systems In the Service Sector
, vol.32-44
, Issue.1
-
-
Sun, L.1
Li, Y.2
-
18
-
-
46849089265
-
Access control management for ubiquitous computing
-
Wang, H., Cao, J., Zhang, Y., Access control management for ubiquitous computing, Future Generation Computer Systems journal, 870-878(24), 2008.
-
(2008)
Future Generation Computer Systems Journal
, vol.870-878
, Issue.24
-
-
Wang, H.1
Cao, J.2
Zhang, Y.3
-
19
-
-
46849090779
-
Ubiquitous computing environments and its usage access control
-
Wang, H., Cao, J., Zhang, Y., Ubiquitous computing environments and its usage access control, Proceedings of the First International Conference on Scalable Information System,. ACM Press, Hong Kong, China, 72-81, 2006.
-
(2006)
Proceedings of the First International Conference On Scalable Information System,. ACM Press, Hong Kong, China
, pp. 72-81
-
-
Wang, H.1
Cao, J.2
Zhang, Y.3
-
21
-
-
4143074723
-
A logical specification for usage control
-
Zhang, X., Park, J., Parisi-Presicce, F., A logical specification for usage control, In SACMAT'4. ACM Press, 2004.
-
(2004)
SACMAT'4. ACM Press
-
-
Zhang, X.1
Park, J.2
Parisi-Presicce, F.3
|