{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T09:28:25Z","timestamp":1744450105291,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031638503"},{"type":"electronic","value":"9783031638510"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-63851-0_13","type":"book-chapter","created":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T23:01:51Z","timestamp":1719529311000},"page":"192-203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Behavioral and Human-Centric Access Control Model in XACML Reference Architecture: Design and Implementation of EHR Case Study"],"prefix":"10.1007","author":[{"given":"Nastaran","family":"Farhadighalati","sequence":"first","affiliation":[]},{"given":"Jose","family":"Barata","sequence":"additional","affiliation":[]},{"given":"Sanaz","family":"Nikghadam-Hojjati","sequence":"additional","affiliation":[]},{"given":"Eda","family":"Marchetti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,28]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"129429","DOI":"10.1109\/ACCESS.2022.3228505","volume":"10","author":"M Wazid","year":"2022","unstructured":"Wazid, M., Das, A.K., Mohd, N., Park, Y.: Healthcare 5.0 security framework: applications, issues and future research directions. IEEE Access 10, 129429\u2013129442 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3228505","journal-title":"IEEE Access"},{"issue":"4","key":"13_CR2","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.glohj.2021.11.008","volume":"5","author":"E Mbunge","year":"2021","unstructured":"Mbunge, E., Muchemwa, B., Jiyane, S., Batani, J.: Sensors and healthcare 5.0: transformative shift in virtual care through emerging digital health technologies. Glob. Health J. 5(4), 169\u2013177 (2021). https:\/\/doi.org\/10.1016\/j.glohj.2021.11.008","journal-title":"Glob. Health J."},{"issue":"3","key":"13_CR3","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/s10389-022-01795-z","volume":"32","author":"R Tertulino","year":"2023","unstructured":"Tertulino, R., Antunes, N., Morais, H.: Privacy in electronic health records: a systematic mapping study. J. Public Health 32(3), 435\u2013454 (2023). https:\/\/doi.org\/10.1007\/s10389-022-01795-z","journal-title":"J. Public Health"},{"key":"13_CR4","unstructured":"Security, H.N.: Cyberattacks on healthcare organizations affect patient care. https:\/\/www.helpnetsecurity.com\/2023\/10\/17\/healthcare-organizations-cyberattacks\/ (03 2023)"},{"issue":"1","key":"13_CR5","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/775265.775268","volume":"8","author":"BW Lampson","year":"1974","unstructured":"Lampson, B.W.: Protection. ACM SIGOPS Operat. Syst. Rev. 8(1), 18\u201324 (1974)","journal-title":"ACM SIGOPS Operat. Syst. Rev."},{"key":"13_CR6","doi-asserted-by":"publisher","unstructured":"Benantar, M.: Access control systems: security, identity management and trust models. Springer Science & Business Media (2005). https:\/\/doi.org\/10.1007\/0-387-27716-1","DOI":"10.1007\/0-387-27716-1"},{"key":"13_CR7","doi-asserted-by":"publisher","unstructured":"Jeong, M.A., Kim, J.J., Won, Y.: A flexible database security system using multiple access control policies. In: International Conference on Database and Expert Systems Applications. pp. 876\u2013885. Springer (2003). https:\/\/doi.org\/10.1007\/978-3-540-45227-0_85","DOI":"10.1007\/978-3-540-45227-0_85"},{"key":"13_CR8","unstructured":"Rahman, M.U.: Scalable role-based access control using the eos blockchain. arXiv preprint arXiv:2007.02163 (2020)"},{"issue":"6","key":"13_CR9","doi-asserted-by":"publisher","first-page":"4682","DOI":"10.1109\/JIOT.2020.2969326","volume":"7","author":"J Qiu","year":"2020","unstructured":"Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., Fang, B.: A survey on access control in the age of internet of things. IEEE Internet Things J. 7(6), 4682\u20134696 (2020)","journal-title":"IEEE Internet Things J."},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Makupi, D., Masese, N.: Determining information security maturity level of an organization based on ISO 27001 (2019)","DOI":"10.24940\/theijbm\/2019\/v7\/i6\/BM1906-038"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Chen, H., et al.: Task-attributebased access control scheme for IOT via blockchain. Comput. Mater. Continua 65(3) (2020)","DOI":"10.32604\/cmc.2020.011824"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Iyer, P., Masoumzadeh, A.: Generalized mining of relationship-based access control policies in evolving systems. In: Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, pp. 135\u2013140 (2019)","DOI":"10.1145\/3322431.3325419"},{"issue":"12","key":"13_CR13","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s10916-016-0589-z","volume":"40","author":"M Jayabalan","year":"2016","unstructured":"Jayabalan, M., O\u2019Daniel, T.: Access control and privilege management in electronic health record: a systematic literature review. J. Med. Syst. 40(12), 261 (2016)","journal-title":"J. Med. Syst."},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Sinha, G., KC, P.S., Jain, S.: Evolution of access control models for protection of patient details, a survey. Int. J. Eng. Technol. 7, 554\u2013558 (2018)","DOI":"10.14419\/ijet.v7i2.8.10520"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Hathaliya, J., Sharma, P., Tanwar, S., Gupta, R.: Blockchain-based remote patient monitoring in healthcare 4.0. In: 2019 IEEE 9th International Conference on Advanced Computing (IACC), pp. 87\u201391. IEEE (2019)","DOI":"10.1109\/IACC48062.2019.8971593"},{"key":"13_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.sintl.2021.100122","volume":"2","author":"M Javaid","year":"2021","unstructured":"Javaid, M., Haleem, A., Singh, R.P., Rab, S., Suman, R.: Internet of behaviours (IOB) and its role in customer services. Sens. Int. 2, 100122 (2021)","journal-title":"Sens. Int."},{"key":"13_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/7310771","volume":"2021","author":"Y Cheng","year":"2021","unstructured":"Cheng, Y., Gong, B., Jia, Z., Yang, Y., He, Y., Zhang, X.: Efficient and secure crossdomain sharing of blockchain electronic medical records based on edge computing. Secur. Commun. Networks 2021, 1\u201310 (2021)","journal-title":"Secur. Commun. Networks"},{"issue":"1","key":"13_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12910-020-0459-6","volume":"21","author":"SN D\u2019Costa","year":"2020","unstructured":"D\u2019Costa, S.N., Kuhn, I.L., Fritz, Z.: A systematic review of patient access to medical records in the acute setting: practicalities, perspectives and ethical consequences. BMC Med. Ethics 21(1), 1\u201319 (2020)","journal-title":"BMC Med. Ethics"},{"key":"13_CR19","unstructured":"(2020a), O.: extensible access control markup language (xacml) version 3.0. https:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html (Mar 2023)"},{"key":"13_CR20","unstructured":"Ferrer Nicola\u00b4s, G.: Implementation of XACML tools. Master\u2019s thesis, Universitat Polit`ecnica de Catalunya (2021)"},{"key":"13_CR21","unstructured":"NIST: Access control policy testing (ACPT). https:\/\/www.nist.gov\/ programs-projects\/access-control-policy-testing-ACPT (Mar 2023)"},{"key":"13_CR22","unstructured":"LLC, I.T.: Security policy tool user manual. https:\/\/securitypolicytool.com\/ (Aug 2017)"},{"issue":"4","key":"13_CR23","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/2757001.2757003","volume":"1","author":"MA Musen","year":"2015","unstructured":"Musen, M.A.: The Prot\u00e9g\u00e9 project: a look back and a look forward. AI matters 1(4), 4\u201312 (2015)","journal-title":"AI matters"},{"key":"13_CR24","unstructured":"Debellis, M.: A Practical Guide to Building OWL Ontologies Using Protege 55 and Plugins (2021). https:\/\/www.researchgate.net\/publication\/351037551. Accessed 11 May 2023"}],"container-title":["IFIP Advances in Information and Communication Technology","Technological Innovation for Human-Centric Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-63851-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T23:03:41Z","timestamp":1719529421000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-63851-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031638503","9783031638510"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-63851-0_13","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"28 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DoCEIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Doctoral Conference on Computing, Electrical and Industrial Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Caparica","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"doceis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/doceis.dee.fct.unl.pt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}