-
2
-
-
0030273161
-
Control and use of health information: A doctor's perspective
-
F. France, "Control and use of health information: A doctor's perspective, " International Journal of Biomedical Computing, vol. 43, no. 1-2, pages 19-25, 1996.
-
(1996)
International Journal of Biomedical Computing
, vol.43
, Issue.1-2
, pp. 19-25
-
-
France, F.1
-
5
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
S. Osborn, R. Sandhu and Q. Munawer, "Configuring role-based access control to enforce mandatory and discretionary access control policies, " ACM Transactions on Information and Systems Security (TISSEC), vol. 3, no. 2, 2000.
-
(2000)
ACM Transactions on Information and Systems Security (TISSEC)
, vol.3
, Issue.2
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
7
-
-
0035653389
-
Privacy: A review of the literature
-
H. Leino-Kilpi, M. Valimaki, T. Dassen, M. Gasull, C. Lemonidou, A. Scott and M. Arndt, "Privacy: A review of the literature, " International Journal of Nursing Studies, vol. 38, pages 663-671, 2001.
-
(2001)
International Journal of Nursing Studies
, vol.38
, pp. 663-671
-
-
Leino-Kilpi, H.1
Valimaki, M.2
Dassen, T.3
Gasull, M.4
Lemonidou, C.5
Scott, A.6
Arndt, M.7
-
8
-
-
33644968219
-
IT-security and privacy
-
S. Fischer-Hubner, "IT-Security and Privacy, " LNCS 1958, 2001.
-
(2001)
LNCS
, vol.1958
-
-
Fischer-Hubner, S.1
-
9
-
-
84874834655
-
Privacy promises, access control, and privacy management - enforcing privacy throughout an enterprise by extending access control
-
C. S. Powers, P. Ashley and M. Schunter, "Privacy promises, access control, and privacy management - Enforcing privacy throughout an enterprise by extending access control, " Proceedings of the Third International Symposium on Electronic Commerce, pages 13- 21, 2002.
-
(2002)
Proceedings of the Third International Symposium on Electronic Commerce
, pp. 13-21
-
-
Powers, C.S.1
Ashley, P.2
Schunter, M.3
-
10
-
-
0034206071
-
Protecting privacy in the cyber era
-
Summer
-
J. C. Davis, "Protecting privacy in the cyber era, " IEEE Technology and Society Magazine, pages 10- 22, Summer 2000.
-
(2000)
IEEE Technology and Society Magazine
, pp. 10-22
-
-
Davis, J.C.1
-
11
-
-
33749073849
-
-
HL7, May, Online
-
HL7, "HIPAA Claims and Attachments Preparing for Regulation, " May 2004. Online: www.hl7.org/memonly/downloads/Attachment-Specifications/HIPAA- and-Claims-Attachments-White-Paper-20040518.pdf.
-
(2004)
HIPAA Claims and Attachments Preparing for Regulation
-
-
-
12
-
-
0037402796
-
Privacy-enhancing technologies - Approaches and development
-
V. Senicar, B. Jerman-Blazic and T. Klobucar, "Privacy-enhancing technologies - Approaches and development, " Computer Standards & Interfaces, Volume: 25, Pages: 147-158, 2003.
-
(2003)
Computer Standards & Interfaces
, vol.25
, pp. 147-158
-
-
Senicar, V.1
Jerman-Blazic, B.2
Klobucar, T.3
-
13
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein and C. E. Youman, "Role-based access control models, " IEEE Computer, Volume: 29, Number: 2, Pages: 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
14
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
R. S. Sandhu, V. Bhamidipati and Q. Munawer, "The ARBAC97 model for role-based administration of roles, " ACM Transactions on Information and Systems Security (TISSEC), Volume: 1, Number: 2, Pages: 105-135, 1999.
-
(1999)
ACM Transactions on Information and Systems Security (TISSEC)
, vol.1
, Issue.2
, pp. 105-135
-
-
Sandhu, R.S.1
Bhamidipati, V.2
Munawer, Q.3
-
15
-
-
84992227458
-
Proposed nist standard for role-based access control
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn and R. Chandramouli. "Proposed NIST Standard for Role-Based Access Control, " ACM Transactions on Information and Systems Security (TISSEC), Volume 4, Number 3, 2001.
-
(2001)
ACM Transactions on Information and Systems Security (TISSEC)
, vol.4
, Issue.3
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
16
-
-
63449110864
-
A novel use of rbac to protect privacy in distributed health care information systems
-
LNCS 2727
-
J. Reid, I. Cheong, M. Henricksen and J. Smith. "A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems, " Proceedings of the Eighth Australasian Conference on Information Security and Privacy (ACISP 2003), LNCS 2727, pages 403-415, 2003.
-
(2003)
Proceedings of the Eighth Australasian Conference on Information Security and Privacy (ACISP 2003)
, pp. 403-415
-
-
Reid, J.1
Cheong, I.2
Henricksen, M.3
Smith, J.4
-
17
-
-
0032031231
-
The electronic patient record; the management of access-case study: Leiden university hospital
-
K. Louwerse, "The electronic patient record; the management of access-case study: Leiden University Hospital, " International Journal of Medical Informatics, vol. 49, no. 1, pages 39-44, 1998.
-
(1998)
International Journal of Medical Informatics
, vol.49
, Issue.1
, pp. 39-44
-
-
Louwerse, K.1
-
18
-
-
0034315774
-
Security of the distributed electronic patient record: A case-based approach to identifying policy issues
-
J. Anderson, "Security of the distributed electronic patient record: A case-based approach to identifying policy issues, " International Journal of Medical Informatics, vol. 60, no. 2, pages 111-118, 2000.
-
(2000)
International Journal of Medical Informatics
, vol.60
, Issue.2
, pp. 111-118
-
-
Anderson, J.1
-
19
-
-
0142151165
-
A contextual role-based access control authorization model for electronic patient record
-
Sept.
-
G. H. M. B. Motta and S. S. Furuie, "A contextual role-based access control authorization model for electronic patient record, " IEEE Transactions on Information Technology in Biomedicine, vol. 7, no. 3, pages: 202- 207, Sept. 2003.
-
(2003)
IEEE Transactions on Information Technology in Biomedicine
, vol.7
, Issue.3
, pp. 202-207
-
-
Motta, G.H.M.B.1
Furuie, S.S.2
|