- GRIMSON, J., GRIMSON, W., and HASSELBRING W., 2000, The System Integration (SI) Challenge in Health Care, Communications of the ACM, 43, 49-55, Vol. 6.
- GIURI, L., and IGLIO, P., 1997, Role Templates for content-Based Access Control, Proceedings of the Second ACM Workshop on Role-Based Access Control, RBAC'97, Fairfax, VA, USA. November 1997, pp. 153-159.
- BEZNOSOV, K., 1998, Requirements for access control: US Healthcare domain, Proceedings of the Third ACM workshop on Role-Based Access Control, RBAC'98, Fairfax, VA, USA. October 1998, pp. 43.
- LUPU, E., and SLOMAN, M., 1997, Reconciling Role Based Management and Role based Access Control, Proceedings of the Second ACM Workshop on Role-Based Access Control, RBAC'97, Fairfax, VA, USA. November 1997, pp. 135-141.
- GEPRGIADIS, C. K., MAVRIDIS, I., PANGALOS, G., and THOMAS, R. K., 2001, Flexible Team-based Access Control Using Contexts, Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Chantilly, VA, USA. May 2001, pp. 21-27.
- SANDHU, R., FERRAIOLO, D., and KUHN, R., 2000, The NIST Model for Role-Based Access Control: Towards A Unified Standard, Proceedings of the Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Technical University of Berlin, Berlin, Germany. July 2000, pp. 47-63.
- THOMAS, R. K., 1997, Team-Based Access Control (TMAC): A Primitive for Applying Role-Based Access Controls in Collaborative Environments, Proceedings of the Second ACM Workshop on Role-Based Access Control, RBAC 97, Fairfax, VA USA. November 1997, pp. 13-19.
- GEORGIADIS, C. K., MAVRIDIS, I., and PANGALOS, G., 2000, Context and Role Based Hybrid Access Control for Collaborative Environments, Proceedings of the Fifth Nordic Workshop on Secure IT Systems - Encouraging Co-operation, NORDSEC 2000, Reykjavik, Iceland. October 2000, pp. 225-238.
- SANDHU, R., 1998, Role-based Access Control, Advances in Computers, 46n Academic Press, 1998.
- GEORGIADIS, C. K., MAVRIDIS, I., and PANGALOS, G., 2000, Active Security Issues in Healthcare Information Systems, Proceedings of the International Workshop on Emerging Issues in Computer and Systems Sciences, WS-EICSS'00, Stockholm, Sweden. September 2000, pp. 25-34.
- HYNES, M., 2001, An Analysis of Distributed Network Security Services: Kerberos and Public Key Infrastructure (PKI), Guardent Inc. (white paper), Cisco World magazine, April 2001, http://www.ciscoworldmagazine.com/webpapers/2001/04_guardent.shtml
- UML, 1997, Unified Modelling Language Notation Guide version 1.1, Rational Software Corporation, September 1997, http://www.rational.com/uml
- MAVRIDIS, I., GEORGIADIS, C. K., PANGALOS, G., and KHAIR, M., 2000, Access Control based on Attribute Certificates for Medical Intranet Applications, Journal of Medical Internet Research, JMIR, 2001;3(1):e9, http://www.jmir.org/2001/1/e9
- ARSENAULT, A., and TURNER, S., 2000, Internet X.509 Public Key Infrastructure PXIX Roadmap, IETF Group, Internet Draft: draft.ietf.pkix.roadmap-06.txt, work in progress, November 2000, http://www.ietf.org/shadow.html
- FARREL, S., and HOUSLEY, R., 2001, An Internet Attribute Certificate Profile for Authorization, IEFT Group, Internet Draft: draft.ietf.pkix.ac509prof-09.txt, work in progress, June 2001, http://www.ietf.org/shadow.html
- LINN, J., and NYSTROM, M, 1999, Attribute Certification: An Enabling Technology for Delegation and Role-Based Controls in Distributed Environments, Proceedings of the Forth ACM Workshop on Role-Based Access Control, RBAC'99, Fairfax, VA, USA. October 1999, pp. 121-129.
- MAVRIDIS, I., GEORGIADIS, C. K., and PANGALOS, G., 2001, Access-rule Certificates for Secure Distributed Healthcare Applications over the Internet, Proceedings of the Sixth International Symposium on Health Information Management Research (iSHIMR 2001), Halkidiki, Greece. May 2001, pp. 153-168.
- BESNOSOV, K., and DENG, Y., 1999, A Framework for Implementing Role-based Access Control Using CORBA Security Service, Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC'99, Fairfax, VA, USA. October 1999, pp. 19-32.
Implementing Context and Team Based Access Control in Healthcare Intranets
Reprints and Corporate Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
To request a reprint or corporate permissions for this article, please click on the relevant link below:
Academic Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
Obtain permissions instantly via Rightslink by clicking on the button below:
If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.
Related research
People also read lists articles that other readers of this article have read.
Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.
Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.