{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:43:59Z","timestamp":1742395439413,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540383413"},{"type":"electronic","value":"9783540383437"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11836810_37","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T10:36:57Z","timestamp":1159871817000},"page":"517-529","source":"Crossref","is-referenced-by-count":4,"title":["Delegation in a Distributed Healthcare Context: A Survey of Current Approaches"],"prefix":"10.1007","author":[{"given":"Mila","family":"Katzarova","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Simpson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","unstructured":"EGEE project, http:\/\/egee-intranet.web.cern.ch\/"},{"key":"37_CR2","unstructured":"Oasis eXstensible Access Control Markup Language Committee, XACML V2.0, www.oasis-open.org\/committees\/"},{"key":"37_CR3","unstructured":"Oasis Security Services Technical Committee, SAML V2.0, www.oasis-open.org\/committees\/"},{"key":"37_CR4","unstructured":"The Caldicott Report (December 1997), www.hpa.org.uk\/confidentiality\/caldicott.htm"},{"key":"37_CR5","unstructured":"Datagrid project, http:\/\/eu-datagrid.web.cern.ch\/eu-datagrid\/"},{"key":"37_CR6","unstructured":"Data protection act 1998. The Stationery Office Limited, London (1998)"},{"volume-title":"The Grid: Blueprint For A New Computing Infrastructure","year":"1999","key":"37_CR7","unstructured":"Foster, I., Kesselman, C. (eds.): The Grid: Blueprint For A New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999)"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: 5th ACM Conference on Computer and Communications Security, pp. 83\u201392 (1998)","DOI":"10.1145\/288090.288111"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Gasser, M., McDermott, E.: An architecture for practical delegation in a distributed system. In: IEEE Symposium on Research in Security and Privacy (May 1990), pp. 20\u201330 (1990)","DOI":"10.1109\/RISP.1990.63835"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Geddes, J., Lloyd, S., Simpson, A.C., Rossor, M., Fox, N., Hill, D., Hajnal, J., Lawrie, S., McIntosh, A., Johnstone, E., Wardlaw, J., Perry, D., Procter, R., Bath, P., Bullmore, E.: Neurogrid: Using grid technology to advance neuroscience. In: 18th IEEEd Symposium on Computer-Based Medical Systems, pp. 570\u2013572 (2005)","DOI":"10.1109\/CBMS.2005.76"},{"key":"37_CR11","unstructured":"Healthgrid white paper, http:\/\/whitepaper.healthgrid.org"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280 (April 2002)","DOI":"10.17487\/rfc3280"},{"issue":"7449","key":"37_CR13","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1136\/bmj.328.7449.1145","volume":"328","author":"M. Humber","year":"2004","unstructured":"Humber, M.: National Programme for Information Technology. British Medical Journal\u00a0328(7449), 1145\u20131146 (2004)","journal-title":"British Medical Journal"},{"key":"37_CR14","unstructured":"Navarro, G., Sadhigi-Firozabadi, B., Rissanen, E., Borrell, J.: Constrained delegation in XML-based access control and digital rights management standards. In: Proceedings of Communication,Network and Information Security (December 2003)"},{"issue":"9","key":"37_CR15","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1002\/spe.692","volume":"35","author":"D.J. Power","year":"2005","unstructured":"Power, D.J., Politou, E.A., Slaymaker, M.A., Simpson, A.C.: Towards secure grid-enabled healthcare. Software: Practice and Experience\u00a035(9), 857\u2013871 (2005)","journal-title":"Software: Practice and Experience"},{"issue":"2","key":"37_CR16","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer\u00a029(2), 38\u201347 (1996)","journal-title":"Computer"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Seitz, L., Rissanen, E., Sandholm, T., Firozibadi, B.S., Mulmo, O.: Policy administration control and delegation using XACML and delegent. In: 6th IEEE\/ACM International Workshop on Grid Computing (November 2005)","DOI":"10.1109\/GRID.2005.1542723"},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"Wang, J., Vecchio, D.D., Humphrey, M.: Extending the security assertion markup language to support delegation for web services and grid services. In: IEEE International Conference on Web Services (ICWS 2005) (July 2005)","DOI":"10.1109\/ICWS.2005.59"},{"key":"37_CR19","unstructured":"Welch, V., Foster, I., Kesselman, C., Mulmo, O., Pearlman, L., Tuecke, S., Gawor, J., Meder, S., Siebenlist, F.: X.509 Proxy Certificates for Dynamic Delegation. In: 3rd Annual PKI R&D Workshop (2004)"},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, L., Ahn, G.J., Chu, B.T.: A role-based delegation framework for healthcare information systems. In: SACMAT, pp. 125\u2013134 (2002)","DOI":"10.1145\/507711.507731"},{"issue":"3","key":"37_CR21","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1145\/937527.937530","volume":"6","author":"L. Zhang","year":"2003","unstructured":"Zhang, L., Ahn, G.J., Chu, B.T.: A rule-based framework for role-based delegation and revocation. ACM Transactions on Information and System Security\u00a06(3), 404\u2013441 (2003)","journal-title":"ACM Transactions on Information and System Security"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11836810_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T02:59:17Z","timestamp":1736564357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11836810_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540383413","9783540383437"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11836810_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}