{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T23:02:11Z","timestamp":1743634931346,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540782377"},{"type":"electronic","value":"9783540782384"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-78238-4_38","type":"book-chapter","created":{"date-parts":[[2008,2,29]],"date-time":"2008-02-29T10:21:18Z","timestamp":1204280478000},"page":"371-382","source":"Crossref","is-referenced-by-count":30,"title":["Access Control Requirements for Processing Electronic Health Records"],"prefix":"10.1007","author":[{"given":"Bandar","family":"Alhaqbani","sequence":"first","affiliation":[]},{"given":"Colin","family":"Fidge","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","unstructured":"Biba, K.J.: Integrity Considerations for Secure Computer System. Technical report, Mitre Corporation (1977)"},{"key":"38_CR2","unstructured":"Chhanabhai, P., Holt, A.: Consumers are Ready to Accept the Transition to Online and Electronic Records if They can be Assured of the Security Measures. Medscape General Medicine\u00a09(1) (2007)"},{"key":"38_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/11552055_15","volume-title":"Communications and Multimedia Security","author":"L. Demuynck","year":"2005","unstructured":"Demuynck, L., De Decker, B.: Privacy-Preserving Electronic Health Records. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol.\u00a03677, pp. 150\u2013159. Springer, Heidelberg (2005)"},{"issue":"4","key":"38_CR4","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1145\/1118890.1118891","volume":"37","author":"M. Eichelberg","year":"2005","unstructured":"Eichelberg, M., et al.: A Survey and Analysis of Electronic Healthcare Record Standards. ACM Computing Surveys\u00a037(4), 277\u2013315 (2005)","journal-title":"ACM Computing Surveys"},{"key":"38_CR5","unstructured":"HealthConnect Business Architecture, version 1.0 (2003)"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Bell, D.E., LaPadula, L.J.: Secure Computer Systems: Unified Exposition and Multics Interpretation. Technical report, Mitre Corporation (1976)","DOI":"10.21236\/ADA023588"},{"key":"38_CR7","unstructured":"Ferraiolo, D., Kuhn, D., Chandramouli, R.: Role-Based Access Control. Artech House (2003)"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Finance, B., Medjdoub, S., Pucheral, P.: Privacy of Medical Records: From Law Principles to Practice. In: Computer-Based Medical Systems. Proceedings. 18th IEEE Symposium on, pp. 220\u2013225 (2005)","DOI":"10.1109\/CBMS.2005.89"},{"key":"38_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.2196\/jmir.7.1.e3","volume":"3","author":"D. Tracy Gunter","year":"2005","unstructured":"Tracy Gunter, D., Nicolas Terry, P.: The Emergence of National Electronic Health Record Architectures in the United States and Australia: Models, Costs, and Questions. Journal of Medical Internet Research\u00a03, e3 (2005)","journal-title":"Journal of Medical Internet Research"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Hu, V., Ferraiolo, D., Kuhn, D.: Assessment of Access Control Systems. Technical report, National Institute of Standards and Technology (September 2006)","DOI":"10.6028\/NIST.IR.7316"},{"key":"38_CR11","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1093\/medlaw\/12.1.40","volume":"12","author":"L. Iacovino","year":"2004","unstructured":"Iacovino, L.: Trustworthy Shared Electronic Health Records: Recordkeeping Requirements and HealthConnect. Journal of Law and Medicine\u00a012, 40\u201360 (2004)","journal-title":"Journal of Law and Medicine"},{"issue":"1\u20133","key":"38_CR12","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/S1386-5056(98)00129-4","volume":"52","author":"I. Iakovidis","year":"1998","unstructured":"Iakovidis, I.: Towards Personal Health Record: Current Situation, Obstacles and Trends in Implementation of Electronic Healthcare Record in Europe. International Journal of Medical Informatics\u00a052(1\u20133), 105\u2013115 (1998)","journal-title":"International Journal of Medical Informatics"},{"issue":"3","key":"38_CR13","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1109\/TITB.2003.816562","volume":"7","author":"G. Motta","year":"2003","unstructured":"Motta, G., Furuie, S.S.: A Contextual Role-Based Access Control Authorization Model for Electronic Patient Record. IEEE Transactions on Information Technology in Biomedicine\u00a07(3), 202\u2013207 (2003)","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"38_CR14","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/507711.507722","volume-title":"SACMAT 2002","author":"J. Park","year":"2002","unstructured":"Park, J., Sandhu, R.: Towards Usage Control Models: Beyond Traditional Access Control. In: SACMAT 2002. Proceedings of the 7th ACM symposium on Access Control Models and Technologies, pp. 57\u201364. ACM Press, New York (2002)"},{"key":"38_CR15","doi-asserted-by":"crossref","unstructured":"Ray, P., Wimalasiri, J.: The Need for Technical Solutions for Maintaining the Privacy of EHR. In: EMBS 2006. 28th Annual International Conference of the IEEE, Engineering in Medicine and Biology Society, pp. 4686\u20134689 (2006)","DOI":"10.1109\/IEMBS.2006.260862"},{"key":"38_CR16","unstructured":"Rishel, W., Handler, T., Edwards, J.: A Clear Definition of the Electronic Health Record. Technical report, Gartner (2005)"},{"issue":"9","key":"38_CR17","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"R. Sandhu","year":"1994","unstructured":"Sandhu, R., Samarati, P.: Access Control: Principles and Practice. IEEE Communications Magazine\u00a032(9), 40\u201348 (1994)","journal-title":"IEEE Communications Magazine"},{"key":"38_CR18","doi-asserted-by":"crossref","unstructured":"Simon, R., Zurko, M.: Separation of Duty in Role-Based Environments. In: IEEE Computer Security Foundations Workshop, pp. 183\u2013194 (1997)","DOI":"10.1109\/CSFW.1997.596811"},{"key":"38_CR19","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/507711.507730","volume-title":"Proceedings of the 7th ACM symposium on Access control models and technologies","author":"M. Wilikens","year":"2002","unstructured":"Wilikens, M., Feriti, S., Sanna, A., Masera, M.: A Context-Related Authorization and Access Control Method Based on RBAC: A Case Study from the Health Care Domain. In: Proceedings of the 7th ACM symposium on Access control models and technologies, pp. 117\u2013124. ACM Press, New York (2002)"}],"container-title":["Lecture Notes in Computer Science","Business Process Management Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78238-4_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T20:59:05Z","timestamp":1738097945000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78238-4_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540782377","9783540782384"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78238-4_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}