Copyright © 2015 Donghee Choi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such asmedical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for cont...
In a cloud provisioned medical healthcare system, it is very important to ensure that resources and ...
Over the last few years there has been a rapid development of technologies such as ubiquitous comput...
Access control is an important aspect of any information system. It is a way of ensuring that users ...
Since the access control environment has changed and the threat of insider information leakage has c...
Access control policies in healthcare domain define permissions for users to access different medica...
[[abstract]]In the past years, the public pays more and more attention to patient safety issues. In ...
Especially in biomedical research, individual-level data must be protected due to the sensitivity of...
Access control is a key feature of healthcare information systems. Access control is about enforcing...
Current proposals for access control languages cannot specify policies required by specific applicat...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
Context-based access control is an emerging approach for modeling adaptive solution, making access c...
Information communication technologies will increasingly make security in organizations more complex...
Rapid and reliable information sharing of patient healthcare information has become critical for ach...
Modern medicine has grown to an insurmountable level over the past decades. Today, this sector of hu...
Healthcare information systems deal with sensitive data across complex workflows. They often allow v...
In a cloud provisioned medical healthcare system, it is very important to ensure that resources and ...
Over the last few years there has been a rapid development of technologies such as ubiquitous comput...
Access control is an important aspect of any information system. It is a way of ensuring that users ...
Since the access control environment has changed and the threat of insider information leakage has c...
Access control policies in healthcare domain define permissions for users to access different medica...
[[abstract]]In the past years, the public pays more and more attention to patient safety issues. In ...
Especially in biomedical research, individual-level data must be protected due to the sensitivity of...
Access control is a key feature of healthcare information systems. Access control is about enforcing...
Current proposals for access control languages cannot specify policies required by specific applicat...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
Context-based access control is an emerging approach for modeling adaptive solution, making access c...
Information communication technologies will increasingly make security in organizations more complex...
Rapid and reliable information sharing of patient healthcare information has become critical for ach...
Modern medicine has grown to an insurmountable level over the past decades. Today, this sector of hu...
Healthcare information systems deal with sensitive data across complex workflows. They often allow v...
In a cloud provisioned medical healthcare system, it is very important to ensure that resources and ...
Over the last few years there has been a rapid development of technologies such as ubiquitous comput...
Access control is an important aspect of any information system. It is a way of ensuring that users ...