{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:41:08Z","timestamp":1762033268266,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319191553"},{"type":"electronic","value":"9783319191560"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19156-0_3","type":"book-chapter","created":{"date-parts":[[2015,5,5]],"date-time":"2015-05-05T06:20:28Z","timestamp":1430806828000},"page":"17-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Securing Electronic Medical Record and Electronic Health Record Systems Through an Improved Access Control"],"prefix":"10.1007","author":[{"given":"Pasupathy","family":"Vimalachandran","sequence":"first","affiliation":[]},{"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yanchun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,6]]},"reference":[{"key":"3_CR1","unstructured":"Pearce, C.: Electronic medical records - where to from here?. Professional Practice, Melbourne (2009)"},{"key":"3_CR2","unstructured":"McInnes, D.K., Slatman, D.C., Kidd, M.R.: General practitioners\u2019 use of computers for prescribing and electronic health records: results from a national survey, Australia (2011) http:\/\/www.clinfowiki.org\/wiki\/index.php\/General_practitioners%27_use_of_computers_for_prescribing_and_electronic_health_records:_results_from_a_national_survey (accessed September 12, 2014)"},{"key":"3_CR3","unstructured":"Department of Health Aging , Get your personal eHealth record now, Canberra: Department of Health Aging (2013) www.ehealth.gov.au (accessed June 28, 2013)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Bosch, M., Faber, M.J., Cruijsberg, J., Voerman, G.E., Leatherman, S., Grol, R.P., Hulscher, M., Wensing, M.: Review article: Effectiveness of patient care teams and the role of clinical expertiseand coordination: A literature review. Med. Care Res. and Rev. (2009)","DOI":"10.1177\/1077558709343295"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Kannampallil, T.G., Schauer, G.F., Cohen, T., Patel, V.L.: Considering complexity in healthcare systems. J.Biomed. Informatics (2011)","DOI":"10.1016\/j.jbi.2011.06.006"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Malin, B., Nyemba, S., Paulett, J.: Learning relational policies from electronic health record accesslogs. J. Biomed. Informatics (2011)","DOI":"10.1016\/j.jbi.2011.01.007"},{"key":"3_CR7","unstructured":"Motta, G.H.M.B., Furuie, S.S.: A contextual role-based access control authorization model for electronic patient record. IEEE Transactions on Information Technology in Biomedicine"},{"key":"3_CR8","unstructured":"Symantec Corporation, Strengthening Database Security (2006) http:\/\/www.federalnewsradio.com\/pdfs\/StrengtheningDataBaseSecurityWP.pdf (accessed June 30, 2013)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Barua, M., Liang, X., Lu, R., Shen, X.: An efficient and secure patient-centric access control scheme for eHealth care system. In: IEEE Conference on Computer Communications Workshops (2011)","DOI":"10.1109\/INFCOMW.2011.5928953"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Santos-Pereira, C., Augusto, A.B., Cruz-Correia, R.: A secure RBAC mobile agent access control model for healthcare institutions. In: IEEE 26th International Symposium on Computer-Based Medical Systems (CBMS) (2013)","DOI":"10.1109\/CBMS.2013.6627814"},{"key":"3_CR11","unstructured":"Gajanayake, R., Iannella, R., Sahama, T.: Privacy oriented access control for electronic health records. Presented in Data Usage Management on the Web Workshop at the Worldwide Web Conference. ACM, Lyon Convention Center, Lyon, France (2012)"},{"key":"#cr-split#-3_CR12.1","unstructured":"Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-based access control, 2nd edition. Artech house (2003)"},{"key":"#cr-split#-3_CR12.2","doi-asserted-by":"crossref","unstructured":"Bauer, F.L.: Decrypted Secrets, 2nd edition. Springer (2000)","DOI":"10.1007\/978-3-662-04024-9"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Communications Magazine (1994)","DOI":"10.1109\/35.312842"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Motta, G.H.M.B., Furuie, S.S.: A contextual role-based access control authorization model for electronic patient records. IEEE Information Technology in Biomedicine (2003)","DOI":"10.1109\/TITB.2003.816562"},{"key":"3_CR15","unstructured":"Evered, M., B\u00f6geholz, S.: A case study in access control requirements for a health information system. In: Proceedings of the second Australian Information Security Workshop, AISW 2004, Dunedin, New Zealand (2004)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Byun, J.-W., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, New York, USA (2005)","DOI":"10.1145\/1063979.1063998"},{"key":"3_CR17","unstructured":"Naikuo, Y., Howard, B., Ning, Z.: A purpose-based access control model. Journal of Information Assurance and Security (2007)"},{"key":"3_CR18","unstructured":"Al-Fedaghi, S. S.: Beyond purpose-based privacy access control. In: Proceedings of the Eighteenth Conference on Australasian Database, vol. 63. Australian Computer Society, Inc, Ballarat, Victoria, Australia (2007)"},{"key":"3_CR19","unstructured":"Schulman, A.: Top 10 database attacks, U. K (2007). http:\/\/www.bcs.org\/server.php?show=ConWebDoc.8852"},{"key":"3_CR20","unstructured":"NoWires Research Group, University of Bergin , Introduction to Database Security, Bergin, July 2007. http:\/\/www.kjhole.com\/WebSec\/PDF\/Database.pdf"},{"key":"3_CR21","unstructured":"Espiner, T.: Security Threats Toolkit: Security expertscrticise government database plans, U.K, January 2007. http:\/\/news.zdnet.co.uk\/security\/0,1000000189,39285536,00.htm"},{"issue":"3","key":"3_CR22","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TKDE.2005.35","volume":"17","author":"H Wang","year":"2005","unstructured":"Wang, H., Cao, J., Zhang, Y.: A Flexible Payment Scheme and Its Role-Based Access Control. IEEE Transactions on Knowledge & Data Engineering 17(3), 425\u2013436 (2005)","journal-title":"IEEE Transactions on Knowledge & Data Engineering"},{"issue":"8","key":"3_CR23","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1016\/j.future.2007.07.011","volume":"24","author":"H Wang","year":"2008","unstructured":"Wang, H., Zhang, Y., Cao, J.: Access control management for ubiquitous computing. Future Generation Computer Systems 24(8), 870\u2013878 (2008)","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"3_CR24","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1016\/j.eswa.2010.07.057","volume":"38","author":"E Kabir","year":"2011","unstructured":"Kabir, E., Wang, H., Bertino, E.: A conditional purpose-based access control model with dynamic roles. Expert Systems with Applications 38(3), 1482\u20131489 (2011)","journal-title":"Expert Systems with Applications"}],"container-title":["Lecture Notes in Computer Science","Health Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19156-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T11:37:03Z","timestamp":1674560223000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19156-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319191553","9783319191560"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19156-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"6 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}