메뉴 건너뛰기




Volumn , Issue , 2012, Pages 159-164

Security in healthcare informatics: Design and implementation of a robust authentication and a hybrid access control mechanism

Author keywords

Access control; Authentication; Healthcare informatics; privacy; security

Indexed keywords

ACCESS CONTROL SCHEMES; AUTHENTICATION SCHEME; DESIGN AND IMPLEMENTATIONS; ELECTRONIC HEALTH RECORD; HEALTH CARE INFORMATICS; SECURITY; SECURITY AND PRIVACY; SECURITY REQUIREMENTS;

EID: 84879287509     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (19)
  • 1
    • 84861546683 scopus 로고    scopus 로고
    • Passwords are not enough
    • May
    • T. Matthews, "Passwords are not enough," Elsevier Computer Fraud & Security, Volume 2012, Issue 5, May 2012, pp. 18-20.
    • (2012) Elsevier Computer Fraud & Security , vol.2012 , Issue.5 , pp. 18-20
    • Matthews, T.1
  • 2
    • 84879321830 scopus 로고    scopus 로고
    • Usable authentication for electronic healthcare systems
    • (Accessed: 26 September
    • Q. Wang, H. Jin, "Usable authentication for electronic healthcare systems," Symposium on Usable Privacy and Security (SOUPS), 2008. http://cups.cs.cmu.edu/soups/2008/posters/wang.pdf (Accessed: 26 September, 2012)
    • (2012) Symposium on Usable Privacy and Security (SOUPS), 2008.
    • Wang, Q.1    Jin, H.2
  • 3
    • 85008049424 scopus 로고    scopus 로고
    • T-Engine: Japan's ubiquitous computing architecture is ready for prime time
    • April
    • J. Krikke, "T-Engine: Japan's ubiquitous computing architecture is ready for prime time," IEEE Pervasive Computing, Vol. 4, No. 2, April 2005, pp. 4-9.
    • (2005) IEEE Pervasive Computing , vol.4 , Issue.2 , pp. 4-9
    • Krikke, J.1
  • 4
    • 0035517884 scopus 로고    scopus 로고
    • The eTRON wide-area distributed-system architecture for e-commerce
    • K. Sakamura and N. Koshizuka, "The eTRON wide-area distributed-system architecture for e-commerce," IEEE Micro, Vol. 21, No. 6, 2001, pp. 7-12.
    • (2001) IEEE Micro , vol.21 , Issue.6 , pp. 7-12
    • Sakamura, K.1    Koshizuka, N.2
  • 10
    • 0242709331 scopus 로고    scopus 로고
    • A context-related authorization and access control method based on RBAC: A case study from the health care domain
    • M. Wilikens, S. Feriti, and M. Masera, "A context-related authorization and access control method based on RBAC: A case study from the health care domain," ACM Symposium on Access control Models and Technologies, 2002, pp. 117-124.
    • (2002) ACM Symposium on Access Control Models and Technologies , pp. 117-124
    • Wilikens, M.1    Feriti, S.2    Masera, M.3
  • 12
    • 0031387996 scopus 로고    scopus 로고
    • Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
    • R. K. Thomas, "Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments," ACM workshop on Role-based access control, 1997, pp. 13.19.
    • (1997) ACM Workshop on Role-based Access Control , pp. 13-19
    • Thomas, R.K.1
  • 16
    • 84879288693 scopus 로고    scopus 로고
    • HL7, (Accessed: 26 September, 2012)
    • HL7, http://www.hl7.org/(Accessed: 26 September, 2012)
  • 17
    • 84879318970 scopus 로고    scopus 로고
    • HIPAA, (Accessed: 26 September, 2012)
    • HIPAA, www.hhs.gov/ocr/privacy/index.html (Accessed: 26 September, 2012)
  • 18
    • 84879323797 scopus 로고    scopus 로고
    • Canada Health Infoway, (Accessed: 26 September, 2012)
    • Canada Health Infoway, http://www.infoway-inforoute.ca/langen/(Accessed: 26 September, 2012)
  • 19
    • 77953350247 scopus 로고    scopus 로고
    • Adding attributes to role-based access control
    • June
    • D. R. Kuhn, E. J. Coyne, and T. R. Weil, "Adding Attributes to Role-Based Access Control," IEEE Computer, 43(6), June 2010, pp. 79-81.
    • (2010) IEEE Computer , vol.43 , Issue.6 , pp. 79-81
    • Kuhn, D.R.1    Coyne, E.J.2    Weil, T.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.