2012
DOI: 10.48550/arxiv.1201.4262
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Secondary use of data in EHR systems

Fan Yang,
Chris Hankin,
Flemming Nielson
et al.

Abstract: We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policiespolicies based on the future behavior of a program. A novel feature of our approach is that advice is able to analyze the future use of data. We consider a number of different security policies, concerning both primary and secondary use of data, some of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 47 publications
(70 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?