2006
DOI: 10.1016/j.ijmedinf.2005.08.010
|View full text |Cite
|
Sign up to set email alerts
|

Modelling privilege management and access control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2006
2006
2016
2016

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(33 citation statements)
references
References 3 publications
0
33
0
Order By: Relevance
“…[14][15][16] In addition, numerous technical approaches have been developed to enhance privacy and security across medical records; examples include integrating disparate approaches to privacy, improving access audits, performing in-depth analyses of privacy breaches, and improving models for access controls. [17][18][19][20][21][22][23] At Vanderbilt Medical Center (VMC), an EHR system was developed for outpatient psychiatric records and deployed in 2003. Reasons given for the switch from paper charts included patient safety, with improved access to records in emergencies, lower costs of maintaining records, improved legibility and general convenience, and lower costs of providing responses to increasingly frequent and detailed requirements for copies of records for third-party payers.…”
Section: Data Security and Accessmentioning
confidence: 99%
“…[14][15][16] In addition, numerous technical approaches have been developed to enhance privacy and security across medical records; examples include integrating disparate approaches to privacy, improving access audits, performing in-depth analyses of privacy breaches, and improving models for access controls. [17][18][19][20][21][22][23] At Vanderbilt Medical Center (VMC), an EHR system was developed for outpatient psychiatric records and deployed in 2003. Reasons given for the switch from paper charts included patient safety, with improved access to records in emergencies, lower costs of maintaining records, improved legibility and general convenience, and lower costs of providing responses to increasingly frequent and detailed requirements for copies of records for third-party payers.…”
Section: Data Security and Accessmentioning
confidence: 99%
“…There is an assurance of openness and portability through standards, flexibility and scalability, semantic interoperability and acceptance from the domain experts. In Blobel et al, the authors discuss the fundamentals of future-proof health systems describing an “atomic component” [44]. We apply this notion by creating an “atomic component” that must be guaranteed utilizing the eHB to associate the subject on the study (as the atomic component) with their biospecimens, phenotypic and genomic data.
Fig.
…”
Section: Methodsmentioning
confidence: 99%
“…The privilege management viewpoint is used by ISO PMAC specification and it allows the system authority to assign the privilege to individual actors or to groups of individual actors which can be a human user, a system or application etc., and playing the closed role to role viewpoint [14].…”
Section: Multiple Views On Access Controlmentioning
confidence: 99%