In the medical sphere, personal and medical informa-tion is collected, stored, and transmitted for various pur-poses, such as, continuity of care, rapid formulation of diagnoses, and billing. Many of these operations must comply with federal regulations like the Health Insurance Portability and Accountability Act (HIPAA). To this end, we need a specification language that can precisely capture the requirements of HIPAA. We also need an enforcement engine that can enforce the pri-vacy policies specified in the language. In the current work, we evaluate eXtensible Access Control Markup Language (XACML) as a candidate specification lan-guage for HIPAA privacy rules. We evaluate XACML based on the set of features required to sufficiently ex-pre...
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatme...
Obligations are an important and indispensable part of many access control policies, such as those i...
In this paper we describe extensions to the access control industry standards XACML and SAML to enab...
Some software applications are developed to collect, store, and manage users\u27 personal, medical, ...
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) defines a set of security an...
Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a set of rules to be followed...
Most of the modern health-related information is collected, maintained, and accessed through compute...
The importance of the exchange of Electronic Health Records (EHRs) between hospitals has been recogn...
Most access control mechanisms focus on how to define the rights of users in a precise way to preven...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
The Health Insurance Portability and Accountability Act (HIPAA), signed in 1996, was designed to com...
AbstractMany e-health applications collect patient's health data and track how they are used by pati...
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatme...
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatme...
Obligations are an important and indispensable part of many access control policies, such as those i...
In this paper we describe extensions to the access control industry standards XACML and SAML to enab...
Some software applications are developed to collect, store, and manage users\u27 personal, medical, ...
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) defines a set of security an...
Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a set of rules to be followed...
Most of the modern health-related information is collected, maintained, and accessed through compute...
The importance of the exchange of Electronic Health Records (EHRs) between hospitals has been recogn...
Most access control mechanisms focus on how to define the rights of users in a precise way to preven...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
The Health Insurance Portability and Accountability Act (HIPAA), signed in 1996, was designed to com...
AbstractMany e-health applications collect patient's health data and track how they are used by pati...
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatme...
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatme...
Obligations are an important and indispensable part of many access control policies, such as those i...
In this paper we describe extensions to the access control industry standards XACML and SAML to enab...