{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T23:58:51Z","timestamp":1740095931775,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540876977"},{"type":"electronic","value":"9783540876984"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87698-4_16","type":"book-chapter","created":{"date-parts":[[2008,9,19]],"date-time":"2008-09-19T19:53:29Z","timestamp":1221854009000},"page":"167-180","source":"Crossref","is-referenced-by-count":4,"title":["Secure Interaction Models for the HealthAgents System"],"prefix":"10.1007","author":[{"given":"Liang","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Paul","family":"Lewis","sequence":"additional","affiliation":[]},{"given":"Srinandan","family":"Dasmahapatra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","first-page":"156","volume-title":"Transactions on Dependable and Secure Computing","author":"A.L. Pereira","year":"2006","unstructured":"Pereira, A.L., Muppavarapu, V., Chung, S.M.: Role-based access control for grid database services using the community authorization service. In: Transactions on Dependable and Secure Computing, vol.\u00a03(2), pp. 156\u2013166. IEEE, Los Alamitos (2006)"},{"key":"16_CR2","unstructured":"M-Tech Information Technology, Inc.: Beyond Roles: A Practical Approach to Enterprise User Provisioning (2006)"},{"issue":"3","key":"16_CR3","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1023\/A:1010071910869","volume":"3","author":"M. Wooldridge","year":"2000","unstructured":"Wooldridge, M., Jennings, N.R., Kinny, D.: The Gaia methodology for agent-oriented analysis and design. Journal of Autonomous Agents and Multi-Agent Systems\u00a03(3), 285\u2013312 (2000)","journal-title":"Journal of Autonomous Agents and Multi-Agent Systems"},{"key":"16_CR4","first-page":"125","volume-title":"7th ACM Symposium on Access Control Models and Technologies","author":"L. Zhang","year":"2002","unstructured":"Zhang, L., Ahn, G., Chu, B.: A role-based delegation framework for healthcare information systems. In: 7th ACM Symposium on Access Control Models and Technologies, pp. 125\u2013134. ACM, New York (2002)"},{"key":"16_CR5","unstructured":"Joint Computer Group of the GMSC and RCGP: GMSC and RCGP guidelines for the extraction and use of data from general practitioner computer systems by organisations external to the practice. Appendix III In: Committee on Standards of Data Extraction from General Practice Guidelines (1988)"},{"key":"16_CR6","unstructured":"Hawker, A.: Confidentiality of personal information: a patient survey. Journal of Informatics in Primary Care, 16\u201319 (1995)"},{"key":"16_CR7","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1136\/bmj.312.7023.109","volume":"312","author":"R.J. Anderson","year":"1996","unstructured":"Anderson, R.J.: Clinical system security: interim guidelines. British Medical Journal\u00a0312, 109\u2013111 (1996)","journal-title":"British Medical Journal"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Pitchford, R.A., Kay, S.: GP Practice computer security survey. Journal of Informatics in Primary Care, 6\u201312 (1995)","DOI":"10.14236\/jhi.v4i1.190"},{"key":"16_CR9","unstructured":"Anderson, R.J.: Patient Confidentiality - At Risk from NHS Wide Networking. Proceedings of Healthcare\u00a096 (1996)"},{"key":"16_CR10","unstructured":"BMA - British Medical Association, \n                    \n                      http:\/\/www.bma.org.uk\/"},{"key":"16_CR11","unstructured":"Chandramouli, R.: Business Process Driven Framework for defining an Access Control Service based on Roles and Rules. In: 23rd National Information Systems Security Conference (2000)"},{"key":"16_CR12","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/11493402_11","volume-title":"Declarative Agent Languages and Technologies II","author":"D. Robertson","year":"2005","unstructured":"Robertson, D.: A lightweight coordination calculus for agent systems. In: Leite, J.A., Omicini, A., Torroni, P., Yolum, p. (eds.) DALT 2004. LNCS (LNAI), vol.\u00a03476, pp. 183\u2013197. Springer, Heidelberg (2005)"},{"key":"16_CR13","unstructured":"Robertson, D., et al.: Open Knowledge: Semantic Webs Through Peer-to-Peer Interaction. OpenKnowledge Manifesto (2006), \n                    \n                      http:\/\/www.openk.org\/"},{"issue":"14","key":"16_CR14","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1016\/S0950-5849(03)00097-1","volume":"45","author":"R. Crook","year":"2003","unstructured":"Crook, R., Ince, D., Nuseibeh, B.: Modelling Access Policies Using Roles in Requirements Engineering. Information and Software Technology\u00a045(14), 979\u2013991 (2003)","journal-title":"Information and Software Technology"},{"key":"16_CR15","unstructured":"Calam, D.: Information Governance - Security, Confidentiality and Patient Identifiable Information, \n                    \n                      http:\/\/etdevents.connectingforhealth.nhs.uk\/eventmanager\/uploads\/ig.ppt"},{"issue":"2","key":"16_CR16","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. Computer\u00a029(2), 38\u201347 (1996)","journal-title":"Computer"},{"issue":"3","key":"16_CR17","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.ijmedinf.2003.11.018","volume":"73","author":"B. Blobel","year":"2004","unstructured":"Blobel, B.: Authorisation and access control for electronic health record systems. International Journal of Medical Informatics\u00a073(3), 251\u2013257 (2004)","journal-title":"International Journal of Medical Informatics"},{"key":"16_CR18","unstructured":"HealthAgents, \n                    \n                      http:\/\/www.healthagents.net\/"},{"key":"16_CR19","first-page":"673","volume-title":"30th International Conference on Software Engineering","author":"L. Xiao","year":"2008","unstructured":"Xiao, L., Lewis, P., Gibb, A.: Developing a Security Protocol for a Distributed Decision Support System in a Healthcare Environment. In: 30th International Conference on Software Engineering, pp. 673\u2013682. ACM, New York (2008)"},{"key":"16_CR20","unstructured":"Hu, J., Weaver, A.C.: Dynamic, Context-Aware Access Control for Distributed Healthcare Applications. In: 1st Workshop on Pervasive Security, Privacy and Trust (2004)"},{"issue":"5","key":"16_CR21","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.entcs.2004.11.045","volume":"128","author":"A. Omicini","year":"2005","unstructured":"Omicini, A., Ricci, A., Viroli, M.: RBAC for organisation and security in an agent coordination infrastructure. Electronic Notes in Theoretical Computer Science\u00a0128(5), 65\u201385 (2005)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"16_CR22","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1136\/bmj.322.7284.442","volume":"322","author":"R. Anderson","year":"2001","unstructured":"Anderson, R.: Undermining data privacy in health information. BMJ\u00a0322, 442\u2013443 (2001)","journal-title":"BMJ"},{"key":"16_CR23","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.1136\/bmj.318.7194.1328","volume":"318","author":"I. Denley","year":"1999","unstructured":"Denley, I., Smith, S.W.: Privacy in clinical information systems in secondary care. BMJ\u00a0318, 1328\u20131331 (1999)","journal-title":"BMJ"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Xiao, L., Greer, D.: Adaptive Agent Model: Software Adaptivity using an Agent-oriented Model Driven Architecture. Information & Software Technology. Elsevier. In: Press (2008), \n                    \n                      http:\/\/dx.doi.org\/10.1016\/j.infsof.2008.02.002","DOI":"10.1016\/j.infsof.2008.02.002"},{"key":"16_CR25","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/COMPSAC.2007.55","volume-title":"31st IEEE Annual International Computer Software and Applications Conference","author":"L. Xiao","year":"2007","unstructured":"Xiao, L., Peet, A., Lewis, P., Dashmapatra, S., S\u00e1ez, C., Croitoru, M., Vicente, J., Gonzalez-Velez, H., Lluchi Ariet, M.: An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment. In: 31st IEEE Annual International Computer Software and Applications Conference, pp. 261\u2013266. IEEE, Los Alamitos (2007)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87698-4_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:45:22Z","timestamp":1619523922000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87698-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540876977","9783540876984"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87698-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}