{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:48:29Z","timestamp":1756385309975,"version":"3.40.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642275845"},{"type":"electronic","value":"9783642275852"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27585-2_10","type":"book-chapter","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T22:38:29Z","timestamp":1328654309000},"page":"119-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Flexible and Dynamic Consent-Capturing"],"prefix":"10.1007","author":[{"given":"Muhammad Rizwan","family":"Asghar","sequence":"first","affiliation":[]},{"given":"Giovanni","family":"Russello","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, R.J.: A security policy model for clinical information systems. In: Proceedings of 1996 IEEE Symposium on Security and Privacy, pp. 30\u201343 (May 1996)","DOI":"10.1109\/SECPRI.1996.502667"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Asghar, M.R., Ion, M., Russello, G., Crispo, B.: ESPOON: Enforcing encrypted security policies in outsourced environments. In: The Sixth International Conference on Availability, Reliability and Security, ARES 2011 (2011)","DOI":"10.1109\/ARES.2011.23"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Becker, M.Y., Sewell, P.: Cassandra: distributed access control policies with tunable expressiveness. In: Proceedings of Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2004, pp. 159\u2013168 (2004)","DOI":"10.1109\/POLICY.2004.1309162"},{"issue":"2","key":"10_CR4","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1197\/jamia.M1480","volume":"11","author":"E. Coiera","year":"2004","unstructured":"Coiera, E., Clarke, R.: e-Consent: The design and implementation of consumer consent mechanisms in an electronic environment. Journal of the American Medical Informatics Association: JAMIA\u00a011(2), 129\u2013140 (2004)","journal-title":"Journal of the American Medical Informatics Association : JAMIA"},{"key":"10_CR5","unstructured":"European Communities. Directive 95\/46\/ec of the european parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (November 1995), http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=OJ:L:2001:008:0001:0022:EN:PDF"},{"key":"10_CR6","first-page":"125","volume-title":"Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009","author":"J. Jin","year":"2009","unstructured":"Jin, J., Ahn, G.-J., Hu, H., Covington, M.J., Zhang, X.: Patient-centric authorization framework for sharing electronic health records. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, pp. 125\u2013134. ACM, New York (2009)"},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/s102070100010","volume":"1","author":"M. Kudo","year":"2002","unstructured":"Kudo, M.: Pbac: Provision-based access control model. International Journal of Information Security\u00a01, 116\u2013130 (2002), doi:10.1007\/s102070100010","journal-title":"International Journal of Information Security"},{"key":"10_CR8","unstructured":"OASIS. extensible access control markup language (xacml) version 2.0 (February 2005), http:\/\/docs.oasis-open.org\/xacml\/2.0\/access_control-xacml-2.0-core-spec-os.pdf"},{"key":"10_CR9","unstructured":"O\u2019Keefe, C.M., Greenfield, P., Goodchild, A.: A decentralised approach to electronic consent and health information access control. Journal of Research and Practice in Information Technology\u00a037(2) (2005)"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-45203-4_15","volume-title":"Applied Cryptography and Network Security","author":"C. Ruan","year":"2003","unstructured":"Ruan, C., Varadharajan, V.: An Authorization Model for E-consent Requirement in a Health Care Application. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol.\u00a02846, pp. 191\u2013205. Springer, Heidelberg (2003)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Russello, G., Dong, C., Dulay, N.: Consent-based workflows for healthcare management. In: IEEE Workshop on Policies for Distributed Systems and Networks, POLICY 2008, pp. 153\u2013161 (2008)","DOI":"10.1109\/POLICY.2008.22"},{"issue":"2","key":"10_CR12","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer\u00a029(2), 38\u201347 (1996)","journal-title":"Computer"},{"key":"10_CR13","unstructured":"Verhenneman, G.: Consent, an instrument for patient empowerment? In: Proceedings of the 49th FITCE Congress (2010)"},{"issue":"2","key":"10_CR14","first-page":"1","volume":"2","author":"K. Wuyts","year":"2011","unstructured":"Wuyts, K., Scandariato, R., Verhenneman, G., Joosen, W.: Integrating patient consent in e-health access control. IJSSE\u00a02(2), 1\u201324 (2011)","journal-title":"IJSSE"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Yavatkar, R., Pendarakis, D., Guerin, R.: A Framework for Policy-based Admission Control. RFC 2753 (Informational) (January 2000), http:\/\/www.ietf.org\/rfc\/rfc2753.txt","DOI":"10.17487\/rfc2753"},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1145\/1133058.1133084","volume-title":"Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, SACMAT 2006","author":"X. Zhang","year":"2006","unstructured":"Zhang, X., Nakae, M., Covington, M.J., Sandhu, R.: A usage-based authorization framework for collaborative computing systems. In: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, SACMAT 2006, pp. 180\u2013189. ACM, New York (2006)"}],"container-title":["Lecture Notes in Computer Science","Open Problems in Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27585-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T01:38:04Z","timestamp":1742434684000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27585-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642275845","9783642275852"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27585-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}