Access control is used in computer systems to control access to confidential data. In this thesis we develop flexible access control models for users in dynamic col-laborative environments, such as hospitals, or consultancy firms. We propose Audit-based Compliance Control (AC2). In AC2 user actions are not checked immediately (a-priori), like in conventional access control, but users must account for their actions at a later time (a-posteriori), by providing ma-chine-checkable justification proofs to one or more auditors. This allows users to exchange and access confidential data, like health records in a hospital, in an ad hoc manner. A similar design choice was made recently for the Dutch electronic health record infrastructure (AORTA). W...
Recently research is focused on security policy integration and conflict reconciliation among variou...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Access control is a key feature of healthcare information systems. Access control is about enforcing...
Access control is used in computer systems to control access to confidential\ud data. In this thesis...
Role based access control (RBAC) is widely used in health care systems today. Some of the biggest sy...
Role based access control (RBAC) is widely used in health care systems today. Some of the biggest sy...
The delivery of healthcare relies on the sharing of patients information among a group of healthcare...
Traditionally, medical data is stored and processed using paper-based files. Recently, medical facil...
Access control must provide a secure environment for collaboration among independent organizations w...
In this dissertation, previous work on access control for both collaborative and non-collaborative s...
Recently research is focused on security policy integration and conflict reconciliation among variou...
Modern collaborative systems such as the Grid computing paradigm are capable of providing resource s...
Sensitivity of clinical data and strict rules regarding data sharing have caused privacy and securit...
Currently, collaborative environments offer unlimited data sharing for users. Data owners are poorly...
Abstract—Authorization models have become a hot topic fordebate in recent years because of sharing h...
Recently research is focused on security policy integration and conflict reconciliation among variou...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Access control is a key feature of healthcare information systems. Access control is about enforcing...
Access control is used in computer systems to control access to confidential\ud data. In this thesis...
Role based access control (RBAC) is widely used in health care systems today. Some of the biggest sy...
Role based access control (RBAC) is widely used in health care systems today. Some of the biggest sy...
The delivery of healthcare relies on the sharing of patients information among a group of healthcare...
Traditionally, medical data is stored and processed using paper-based files. Recently, medical facil...
Access control must provide a secure environment for collaboration among independent organizations w...
In this dissertation, previous work on access control for both collaborative and non-collaborative s...
Recently research is focused on security policy integration and conflict reconciliation among variou...
Modern collaborative systems such as the Grid computing paradigm are capable of providing resource s...
Sensitivity of clinical data and strict rules regarding data sharing have caused privacy and securit...
Currently, collaborative environments offer unlimited data sharing for users. Data owners are poorly...
Abstract—Authorization models have become a hot topic fordebate in recent years because of sharing h...
Recently research is focused on security policy integration and conflict reconciliation among variou...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Access control is a key feature of healthcare information systems. Access control is about enforcing...