2009 International Conference on Information Management and Engineering 2009
DOI: 10.1109/icime.2009.84
|View full text |Cite
|
Sign up to set email alerts
|

Credential Based Hybrid Access Control Methodology for Shared Electronic Health Records

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Irrespective of these evaluations, it is recommended that solutions should conduct certain case studies while presenting outputs of their proposed schemes and should demonstrate the effects on the performance of the system and the network. Behaviour-based [102], [103] Hybrid [104], [105] Prediction-based [106] Probability-based [107], [108] Standard-based [109] Primary [110], [111] Secondary [112] Grouped [108] Time-bound [103], [113] Resource-bound [97], [100], [114] Hybrid [102] On-site [115]- [117] Off-site [65], [116], [118] securing the content in wearable IoT devices, which are considered as an important part of M-IoT systems. The authors developed an innovative testbed setup for evaluating the security policies of dynamic IoT devices.…”
Section: F Methodologies For Analyses Of Security Privacy and Trust In Smart M-iotmentioning
confidence: 99%
See 1 more Smart Citation
“…Irrespective of these evaluations, it is recommended that solutions should conduct certain case studies while presenting outputs of their proposed schemes and should demonstrate the effects on the performance of the system and the network. Behaviour-based [102], [103] Hybrid [104], [105] Prediction-based [106] Probability-based [107], [108] Standard-based [109] Primary [110], [111] Secondary [112] Grouped [108] Time-bound [103], [113] Resource-bound [97], [100], [114] Hybrid [102] On-site [115]- [117] Off-site [65], [116], [118] securing the content in wearable IoT devices, which are considered as an important part of M-IoT systems. The authors developed an innovative testbed setup for evaluating the security policies of dynamic IoT devices.…”
Section: F Methodologies For Analyses Of Security Privacy and Trust In Smart M-iotmentioning
confidence: 99%
“…Content may change prior to final publication. mechanism for ensuring security in a network [104], [105].…”
Section: A Access Control and Authorization-based Frameworkmentioning
confidence: 99%
“…Solutions in [79]- [84] focus on providing frameworks which utilize user and device authentication through policy and rules over device operations in different network setups. Behaviour-based [85], [86] Hybrid [87], [88] Prediction-based [89] Probability-based [90], [91] Standard-based [92] Primary [93], [94] Secondary [95] Grouped [91] Time-bound [86], [96] Resource-bound [80], [83], [97] Hybrid [85] On-site [98]- [100] Off-site [46], [99], [101] Fig. 8.…”
Section: A Access Control and Authorization-based Frameworkmentioning
confidence: 99%
“…Such types of frameworks are termed as hybrid access control and authorization-based frameworks. Credential-based services and intelligent solutions use such kind of mechanism for ensuring security in a network [87], [88].…”
Section: A Access Control and Authorization-based Frameworkmentioning
confidence: 99%