42
Views
6
CrossRef citations to date
0
Altmetric
Research Article

Implementing Context and Team Based Access Control in Healthcare Intranets

, , &
Pages 185-201 | Published online: 12 Jul 2009

  • GRIMSON, J., GRIMSON, W., and HASSELBRING W., 2000, The System Integration (SI) Challenge in Health Care, Communications of the ACM, 43, 49-55, Vol. 6.
  • GIURI, L., and IGLIO, P., 1997, Role Templates for content-Based Access Control, Proceedings of the Second ACM Workshop on Role-Based Access Control, RBAC'97, Fairfax, VA, USA. November 1997, pp. 153-159.
  • BEZNOSOV, K., 1998, Requirements for access control: US Healthcare domain, Proceedings of the Third ACM workshop on Role-Based Access Control, RBAC'98, Fairfax, VA, USA. October 1998, pp. 43.
  • LUPU, E., and SLOMAN, M., 1997, Reconciling Role Based Management and Role based Access Control, Proceedings of the Second ACM Workshop on Role-Based Access Control, RBAC'97, Fairfax, VA, USA. November 1997, pp. 135-141.
  • GEPRGIADIS, C. K., MAVRIDIS, I., PANGALOS, G., and THOMAS, R. K., 2001, Flexible Team-based Access Control Using Contexts, Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Chantilly, VA, USA. May 2001, pp. 21-27.
  • SANDHU, R., FERRAIOLO, D., and KUHN, R., 2000, The NIST Model for Role-Based Access Control: Towards A Unified Standard, Proceedings of the Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Technical University of Berlin, Berlin, Germany. July 2000, pp. 47-63.
  • THOMAS, R. K., 1997, Team-Based Access Control (TMAC): A Primitive for Applying Role-Based Access Controls in Collaborative Environments, Proceedings of the Second ACM Workshop on Role-Based Access Control, RBAC 97, Fairfax, VA USA. November 1997, pp. 13-19.
  • GEORGIADIS, C. K., MAVRIDIS, I., and PANGALOS, G., 2000, Context and Role Based Hybrid Access Control for Collaborative Environments, Proceedings of the Fifth Nordic Workshop on Secure IT Systems - Encouraging Co-operation, NORDSEC 2000, Reykjavik, Iceland. October 2000, pp. 225-238.
  • SANDHU, R., 1998, Role-based Access Control, Advances in Computers, 46n Academic Press, 1998.
  • GEORGIADIS, C. K., MAVRIDIS, I., and PANGALOS, G., 2000, Active Security Issues in Healthcare Information Systems, Proceedings of the International Workshop on Emerging Issues in Computer and Systems Sciences, WS-EICSS'00, Stockholm, Sweden. September 2000, pp. 25-34.
  • HYNES, M., 2001, An Analysis of Distributed Network Security Services: Kerberos and Public Key Infrastructure (PKI), Guardent Inc. (white paper), Cisco World magazine, April 2001, http://www.ciscoworldmagazine.com/webpapers/2001/04_guardent.shtml
  • UML, 1997, Unified Modelling Language Notation Guide version 1.1, Rational Software Corporation, September 1997, http://www.rational.com/uml
  • MAVRIDIS, I., GEORGIADIS, C. K., PANGALOS, G., and KHAIR, M., 2000, Access Control based on Attribute Certificates for Medical Intranet Applications, Journal of Medical Internet Research, JMIR, 2001;3(1):e9, http://www.jmir.org/2001/1/e9
  • ARSENAULT, A., and TURNER, S., 2000, Internet X.509 Public Key Infrastructure PXIX Roadmap, IETF Group, Internet Draft: draft.ietf.pkix.roadmap-06.txt, work in progress, November 2000, http://www.ietf.org/shadow.html
  • FARREL, S., and HOUSLEY, R., 2001, An Internet Attribute Certificate Profile for Authorization, IEFT Group, Internet Draft: draft.ietf.pkix.ac509prof-09.txt, work in progress, June 2001, http://www.ietf.org/shadow.html
  • LINN, J., and NYSTROM, M, 1999, Attribute Certification: An Enabling Technology for Delegation and Role-Based Controls in Distributed Environments, Proceedings of the Forth ACM Workshop on Role-Based Access Control, RBAC'99, Fairfax, VA, USA. October 1999, pp. 121-129.
  • MAVRIDIS, I., GEORGIADIS, C. K., and PANGALOS, G., 2001, Access-rule Certificates for Secure Distributed Healthcare Applications over the Internet, Proceedings of the Sixth International Symposium on Health Information Management Research (iSHIMR 2001), Halkidiki, Greece. May 2001, pp. 153-168.
  • BESNOSOV, K., and DENG, Y., 1999, A Framework for Implementing Role-based Access Control Using CORBA Security Service, Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC'99, Fairfax, VA, USA. October 1999, pp. 19-32.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.