“…There are role-based, team-based, attribute-based, content-based, scenario-based, situation-aware, context-aware, and context sensitive access control methods (see [14] and [4] for an overview). However, only some of these approaches have been implemented for healthcare scenarios [4]- [15], a few of them consider the problem in distributed and dynamic scenarios [7] whereas a small number of approaches propose models adherent to healthcare standards [14], [2], [5], [8]. In all these systems the notion of e-consent is integrated with the policy decision mechanism.…”