{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:53:41Z","timestamp":1725558821073},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642142819"},{"type":"electronic","value":"9783642142826"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14282-6_12","type":"book-chapter","created":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T10:29:39Z","timestamp":1277720979000},"page":"146-159","source":"Crossref","is-referenced-by-count":2,"title":["Assuring Privacy of Medical Records in an Open Collaborative Environment - A Case Study of Walloon Region\u2019s eHealth Platform"],"prefix":"10.1007","author":[{"given":"Syed","family":"Naqvi","sequence":"first","affiliation":[]},{"given":"Gautier","family":"Dallons","sequence":"additional","affiliation":[]},{"given":"Arnaud","family":"Michot","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Ponsard","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Kinsella, K., He, W.: An Aging World: 2008 - Int. Population Reports (P95\/09-01) (June 2009)"},{"key":"12_CR2","unstructured":"Belgian National Statistical Institute, http:\/\/www.statbel.fgov.be"},{"key":"12_CR3","unstructured":"R\u00e9seau Sant\u00e9 Wallon, http:\/\/www.reseausantewallon.be"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Abou El Kalam, A., El Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Mi\u00e8ge, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy 2003), Como, Italia (June 2003)","DOI":"10.1109\/POLICY.2003.1206966"},{"key":"12_CR5","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of October 24, 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, CELEX number 31995L0046, Official Journal L 281, November 23, pp. 0031 - 0050 (1995)"},{"issue":"1","key":"12_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/775265.775268","volume":"8","author":"B.W. Lampson","year":"1974","unstructured":"Lampson, B.W.: Protection. ACM SIGOPS Operating System Review\u00a08(1), 18\u201324 (1974)","journal-title":"ACM SIGOPS Operating System Review"},{"key":"12_CR7","unstructured":"United States Department of Defense, Trusted Computer System Evaluation Criteria (TCSEC), Deaprtment of Defense Standard CSC-STD-00l-83 (August 1983)"},{"key":"12_CR8","unstructured":"Ferraiolo, D., Kuhn, D.R., Hu, V.C.: Assessment of Access Control Systems, Technical Report NISTIR 7316, National Institute of Standards and Technology, US Department of Commerce (2006)"},{"key":"12_CR9","unstructured":"Bell, D.E., La Padula, L.J.: Secure Computer Systems: Mathematical Foundations, MITRE Corporation Technical Report (1973)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Brewer, D.F.C., Nash, M.J.: The Chinese Wall Security Policy. In: IEEE Symposium on Security and Privacy, pp. 206\u2013214 (1989)","DOI":"10.1109\/SECPRI.1989.36295"},{"issue":"2","key":"12_CR11","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Cuppens, F., Cuppens-Boulahia, N.: Modeling contextual security policies. International Journal of Information Security (IJIS)\u00a07(4) (August 2008)","DOI":"10.1007\/s10207-007-0051-9"},{"issue":"4","key":"12_CR13","first-page":"372","volume":"4","author":"L. Habib","year":"2009","unstructured":"Habib, L., Jaume, M., Morisset, C.: Formal definition and comparison of access control models. Journal of Information Assurance and Security (JIAS), Special Issue on Access Control and Protocols 4(4) , 372\u2013381 (2009)","journal-title":"Special Issue on Access Control and Protocols"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Boustia, N., Mokhtari, A.: Representation and Reasoning on ORBAC: Description Logic with Defaults and Exceptions Approach. In: Proceedings of the 2008 Third international Conference on Availability, Reliability and Security (March 2008)","DOI":"10.1109\/ARES.2008.144"},{"key":"12_CR15","unstructured":"Bena\u00efssa, N., M\u00e9ry, D.: Proof-based design patterns, final report of the RIMEL project (ANR-06-SETI-015) (August 2008)"},{"key":"12_CR16","unstructured":"Miege, A.: Definition d\u2019un environnement formel d\u2019expression de politiques de securite. Modele Or-BAC et extensions\u2019 PhD Dissertation in IT Security, Networks and Computer Science Department of ENST Paris (2005)"},{"key":"12_CR17","unstructured":"MotOrBAC: An open source implementation of the OrBAC model, http:\/\/motorbac.sourceforge.net"},{"key":"12_CR18","volume-title":"Software Abstractions Logic, Language, and Analysis","author":"D. Jackson","year":"2006","unstructured":"Jackson, D.: Software Abstractions Logic, Language, and Analysis. MIT Press, Cambridge (2006)"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"van Lamsweerde, A., Darimont, R., Letier, E.: Managing Conflicts in Goal-Driven Requirements Engineering. IEEE Transactions on Software Engineering, Special Issue on Managing Inconsistency in Software Development, 908\u2013926 (November 1998)","DOI":"10.1109\/32.730542"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Life"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14282-6_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:50:16Z","timestamp":1606186216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14282-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642142819","9783642142826"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14282-6_12","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2010]]}}}