-
1
-
-
33644605913
-
Health information systems -Past, present, future
-
Haux, R., Health information systems -past, present, future. Int. J. Med. Inform. 75:268-281, 2006.
-
(2006)
Int. J. Med. Inform.
, vol.75
, pp. 268-281
-
-
Haux, R.1
-
2
-
-
70349736010
-
The role of service oriented architecture in telemedicine healthcare system
-
IEEE
-
Shaikh, A., Memon, M.,Misbahuddin,M., andMemon, N., The role of service oriented architecture in telemedicine healthcare system. Presented at the Complex, Intelligent and Software Intensive Systems, IEEE, 2009.
-
(2009)
Presented at the Complex, Intelligent and Software Intensive Systems
-
-
Shaikh, A.1
Memon, M.2
Misbahuddin, M.3
Memon, N.4
-
4
-
-
36348961294
-
Delivering a lifelong integrated electronic health record based on a service oriented architecture
-
Katehakis, D. G., Sfakianakis, S. G., Kavlentakis, G., Anthoulakis, D. N., and Tsiknakis, M., Delivering a lifelong integrated electronic health record based on a service oriented architecture. IEEE Trans. Inf. Technol. Biomed. 11(6):639-650, 2007.
-
(2007)
IEEE Trans. Inf. Technol. Biomed.
, vol.11
, Issue.6
, pp. 639-650
-
-
Katehakis, D.G.1
Sfakianakis, S.G.2
Kavlentakis, G.3
Anthoulakis, D.N.4
Tsiknakis, M.5
-
6
-
-
0030086382
-
Role based access control models
-
Sandhu, R., Coyne, E. J., Feinstein, H. L., and Youman, C. E., Role based access control models. IEEE Comput. 29(2):38-48, 1996.
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-48
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
7
-
-
84944792110
-
Trbac: A temporal role-based access control model
-
Bertino, E., Bonatti, P.A., and Ferrari, E., TRBAC: a temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4(3):191-233, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
8
-
-
0002262722
-
Role based access control: Features and motivations
-
IEEE Computer Society Press
-
Ferraiolo, D., Cugini, J., and Kuhn, D. R., Role based access control: features and motivations . 11th Annual Computer Security Applications Proceedings, IEEE Computer Society Press, 1995.
-
(1995)
11th Annual Computer Security Applications Proceedings
-
-
Ferraiolo, D.1
Cugini, J.2
Kuhn, D.R.3
-
9
-
-
0242456746
-
A role-based delegation framework for healthcare information systems
-
Monterey
-
Zhang, L., Ahn, G. J., and Chu, B. T., A role-based delegation framework for healthcare information systems. Seventh ACM Symposium on Access Control Models and Technologies, Monterey, pp. 125-134, 2002.
-
(2002)
Seventh ACM Symposium on Access Control Models and Technologies
, pp. 125-134
-
-
Zhang, L.1
Ahn, G.J.2
Chu, B.T.3
-
10
-
-
65649107926
-
Research of task-role-based access control model
-
Han, R. F., and Wang, H. X., Research of task-role-based access control model. Comput. Eng. Des. 28(4):800-802, 2007.
-
(2007)
Comput. Eng. Des.
, vol.28
, Issue.4
, pp. 800-802
-
-
Han, R.F.1
Wang, H.X.2
-
11
-
-
0031232270
-
A role-based access control for intranet security
-
Tari, Z., and Chan, S. W., A role-based access control for intranet security. IEEE Internet Comput., 1(5):24-34, 1997.
-
(1997)
IEEE Internet Comput.
, vol.1
, Issue.5
, pp. 24-34
-
-
Tari, Z.1
Chan, S.W.2
-
12
-
-
14544298547
-
A case study in access control requirements for a health information system
-
Evered,M., and Bogeholz, S., A case study in access control requirements for a health information system, ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation -Volume 32 pp. 53-61.
-
ACSW Frontiers '04 Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation
, vol.32
, pp. 53-61
-
-
Evered, M.1
Bogeholz, S.2
-
13
-
-
34047155030
-
Security and privacy issues with health care information technology
-
New York City, USA, Aug 30-Sept 3
-
Meingast, M., Roosta, T., and Sastry, S., Security and privacy issues with health care information technology. Proceedings of the 28th IEEE EMBS Annual International Conference, New York City, USA, Aug 30-Sept 3, pp.5453-5458, 2006.
-
(2006)
Proceedings of the 28th IEEE EMBS Annual International Conference
, pp. 5453-5458
-
-
Meingast, M.1
Roosta, T.2
Sastry, S.3
-
14
-
-
52149091653
-
Multi-domain and privacy-Aware role based access control in ehealth
-
Martino, L. D., Ni, Q., Lin, D., and Bertino, E., Multi-domain and Privacy-Aware Role Based Access Control in eHealth. Proceedings of 2nd International Conference on Pervasive Computing Technologies for Healthcare, pp.131-134, 2008.
-
(2008)
Proceedings of 2nd International Conference on Pervasive Computing Technologies for Healthcare
, pp. 131-134
-
-
Martino, L.D.1
Ni, Q.2
Lin, D.3
Bertino, E.4
-
16
-
-
38949168454
-
An attribute-based access control model forweb services
-
Hai-bo, S., and Fan, H., An Attribute-Based Access Control Model forWeb Services. In the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), pp. 74-79, 2006.
-
(2006)
The Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06
, pp. 74-79
-
-
Hai-Bo, S.1
Fan, H.2
|