{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:59:41Z","timestamp":1725868781081},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319480565"},{"type":"electronic","value":"9783319480572"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48057-2_18","type":"book-chapter","created":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T04:37:01Z","timestamp":1477111021000},"page":"251-263","source":"Crossref","is-referenced-by-count":0,"title":["An Enhancement of the Rew-XAC Model for Workflow Data Access Control in Healthcare"],"prefix":"10.1007","author":[{"given":"Thanh Tien","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Nguyen Hoang Nam","family":"Pham","sequence":"additional","affiliation":[]},{"given":"Que Nguyet Tran","family":"Thi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,23]]},"reference":[{"key":"18_CR1","unstructured":"Ha, X.S., Tran, L.K., Dang, T.K., K\u00fcng, J.: Rew\u2013XAC: an approach to request rewriting for elastic ABAC enforcement with dynamic policies (2016, in submission)"},{"key":"18_CR2","unstructured":"Health Insurance Portability and Accountability Act: (n.d.). \nhttps:\/\/en.wikipedia.org\/wiki\/Health_Insurance_Portability_and_Accountability_Act\n\n. Accessed 29 Apr 2016)"},{"issue":"3","key":"18_CR3","doi-asserted-by":"publisher","first-page":"190","DOI":"10.3109\/17538157.2011.647935","volume":"37","author":"Y Zhang","year":"2012","unstructured":"Zhang, Y., Dhileepan, S., Schmidt, M., Zhong, S.: Emergency access for online personally controlled health records system. Inform. Health Soc. Care 37(3), 190\u2013202 (2012). doi:\n10.3109\/17538157.2011.647935","journal-title":"Inform. Health Soc. Care"},{"key":"18_CR4","doi-asserted-by":"publisher","unstructured":"Elkandoussi, A., Elbakkali, H.: On access control requirements for inter-organizational workflow. In: Proceedings of the 4th Edition of National Security Days (JNS4) (2014). doi:\n10.1109\/jns4.2014.6850128","DOI":"10.1109\/jns4.2014.6850128"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1023\/A:1012972608697","volume":"18","author":"W Shengli","year":"2002","unstructured":"Shengli, W., Amit, S., John, M., Zongwei, L.: Authorization and access control of application data in workflow systems. J. Intell. Inf. Syst. 18, 71\u201394 (2002). doi:\n10.1023\/A:1012972608697","journal-title":"J. Intell. Inf. Syst."},{"key":"18_CR6","unstructured":"XACML (n.d.). \nhttps:\/\/en.wikipedia.org\/wiki\/XACML\n\n. Accessed 29 Apr 2016"},{"key":"18_CR7","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/11805588_13","volume-title":"Data and Applications Security XX","author":"S Barker","year":"2006","unstructured":"Barker, S., Fern\u00e1ndez, M.: Term rewriting for access control. In: Damiani, E., Liu, P. (eds.) Data and Applications Security XX. LNCS, vol. 4127, pp. 179\u2013193. Springer, Heidelberg (2006). doi:\n10.1007\/11805588_13"},{"key":"18_CR8","doi-asserted-by":"publisher","unstructured":"Thi, Q.N., Dang, T.K.: X-STROWL: a generalized extension of XACML for context-aware spatio-temporal RBAC model with OWL. In: Seventh International Conference on Digital Information Management (ICDIM 2012) (2012). doi:\n10.1109\/icdim.2012.6360113","DOI":"10.1109\/icdim.2012.6360113"},{"issue":"6","key":"18_CR9","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1197\/jamia.m3119","volume":"16","author":"SR Thadani","year":"2009","unstructured":"Thadani, S.R., Weng, C., Bigger, J.T., Ennever, J.F., Wajngurt, D.: Electronic screening improves efficiency in clinical trial recruitment. J. Am. Med. Inform. Assoc. 16(6), 869\u2013873 (2009). doi:\n10.1197\/jamia.m3119","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"18_CR10","doi-asserted-by":"publisher","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K.: Guide to Attribute Based Access Control (ABAC) Definition and Considerations (2014). doi:\n10.6028\/nist.sp.800-162","DOI":"10.6028\/nist.sp.800-162"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Anderson, A.H.: A comparison of two privacy policy languages. In: Proceedings of the 3rd ACM Workshop on Secure Web Services - SWS 2006 (2006). doi:\n10.1145\/1180367.1180378","DOI":"10.1145\/1180367.1180378"},{"key":"18_CR12","unstructured":"Le, T. (n.d.): Itraconazole Versus Amphotericin B for the treatment of Penicilliosis (IVAP). \nhttp:\/\/isrctn.org\/"}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48057-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T04:44:18Z","timestamp":1477111458000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48057-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319480565","9783319480572"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48057-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}