This document looks at the issues of how to define and implement access control in healthcare networks that might even span across communities. The focus is mainly on issues that relate to the IT architecture and the flow of messages that are required for a distributed access control scenario. Therefore this paper will deal with the problems of (1) how to apply established principles of secure design and SOA security on the design of access control systems and, (2) how to model an access control solution in a way that is well suited for reasoning and evaluation. It also begins the discussion of how to deploy an access control solution using well understood patterns and interoperable system components as seen in appendix C. Given the strong ...
Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) ...
Abstract — The related and often challenging topics of identity management and access control form a...
BACKGROUND: Internet-based health-record management requires not only the provision of strong data p...
Summary Enabling the shared care paradigm, centralised or even decentralised electronic health recor...
Access control is a key feature of healthcare information systems. Access control is about enforcing...
Healthcare informatics affirm that healthcare presents most problems of user control with disparate,...
Within a healthcare environment, organizational, legal, functional, social, ethical, and technical r...
As an emerging form of enabling technology, Web-based e-Health portals provide patients easier acces...
Demand for electronic health care systems is increasing. In addition to this, more of the systems be...
Nowadays a great number of activities are performed via internet. With increment in such activities,...
AbstractOne of the most important characteristics of current enterprise systems is the existence of ...
The service oriented architecture (SOA) is gaining more momen-tum with the advent of network service...
In this paper, we analyse the special security requirements for software support in healthcare and t...
In this paper we describe an approach to the facilitation of system-wide security that enables fine-...
Notwithstanding the obvious potential advantages of information and communications technology (ICT) ...
Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) ...
Abstract — The related and often challenging topics of identity management and access control form a...
BACKGROUND: Internet-based health-record management requires not only the provision of strong data p...
Summary Enabling the shared care paradigm, centralised or even decentralised electronic health recor...
Access control is a key feature of healthcare information systems. Access control is about enforcing...
Healthcare informatics affirm that healthcare presents most problems of user control with disparate,...
Within a healthcare environment, organizational, legal, functional, social, ethical, and technical r...
As an emerging form of enabling technology, Web-based e-Health portals provide patients easier acces...
Demand for electronic health care systems is increasing. In addition to this, more of the systems be...
Nowadays a great number of activities are performed via internet. With increment in such activities,...
AbstractOne of the most important characteristics of current enterprise systems is the existence of ...
The service oriented architecture (SOA) is gaining more momen-tum with the advent of network service...
In this paper, we analyse the special security requirements for software support in healthcare and t...
In this paper we describe an approach to the facilitation of system-wide security that enables fine-...
Notwithstanding the obvious potential advantages of information and communications technology (ICT) ...
Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) ...
Abstract — The related and often challenging topics of identity management and access control form a...
BACKGROUND: Internet-based health-record management requires not only the provision of strong data p...