2008 21st IEEE International Symposium on Computer-Based Medical Systems 2008
DOI: 10.1109/cbms.2008.14
|View full text |Cite
|
Sign up to set email alerts
|

Behavior-Based Access Control for Distributed Healthcare Environment

Abstract: I want to take t his opport unity t o thank those who helped me t o complete this research . I would like to express my thanks to Dr. Douglas Down and Dr. Kamran Sart ipi for t heir guidance and cont inuous support . We browsed a wide range of topics and had several discussions to narrow down my research to a concrete comprehensive work. During t his research they taught me valuable academic skills that will certainly be beneficial t o my fut ure performance.Also, special gratit ude to Dr. Karim Keshavj ee who… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
2
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…However, other features for confidentiality, privacy and provenance control are frequently available. All studies presented some authorization mechanism for health data integration through semantic web technologies [6,15,16,18,32,35,36,38,39,47,[50][51][52]57,60]. However, only a few have implemented additional features for authentication [16,18,36,38,51,57], confidentiality [16,18], privacy [16,18,39,47,52], and provenance [47].…”
Section: Access Controlmentioning
confidence: 99%
“…However, other features for confidentiality, privacy and provenance control are frequently available. All studies presented some authorization mechanism for health data integration through semantic web technologies [6,15,16,18,32,35,36,38,39,47,[50][51][52]57,60]. However, only a few have implemented additional features for authentication [16,18,36,38,51,57], confidentiality [16,18], privacy [16,18,39,47,52], and provenance [47].…”
Section: Access Controlmentioning
confidence: 99%
“…Weerasinghe et al [30] present a security capsule with token management architecture in order to have secure transmission and data storage on device. Some models also use access control for healthcare systems based on users behaviours [31]. In [33] the authors propose a role-based prorogate framework.…”
Section: Healthcare Information Systemsmentioning
confidence: 99%
“…Securing the processing of private data in distributed environment has been the subject of intense research, given the rise of social network and e-health systems. Many researches have contributed to this aspect ranging from access control, usage control, usage policy expression languages, secure communication protocol, and enforcement of usage policy (Li and Hoang, 2009;Russello et al, 2008;Lillian, 2008;yarmand et al, 2008). Among them, enforcing the privacy-aware usage policy is the main challenge, given the fact that, in distributed environment, the direct control on data is not possible.…”
Section: Motivation and Related Workmentioning
confidence: 99%