{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:42:21Z","timestamp":1725676941627},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642296147"},{"type":"electronic","value":"9783642296154"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29615-4_17","type":"book-chapter","created":{"date-parts":[[2012,4,23]],"date-time":"2012-04-23T07:30:30Z","timestamp":1335166230000},"page":"240-255","source":"Crossref","is-referenced-by-count":3,"title":["Visualization Control for Event-Based Public Display Systems Used in a Hospital Setting"],"prefix":"10.1007","author":[{"given":"Inger Anne","family":"T\u00f8ndel","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"O\u2019Neill, E., Woodgate, D., Kostakos, V.: Easing the wait in the emergency room: building a theory of public information systems. In: Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, DIS 2004, pp. 17\u201325 (2004)","DOI":"10.1145\/1013115.1013120"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Bardram, J.E., Hansen, T.R., Soegaard, M.: Awaremedia: a shared interactive display supporting social, temporal, and spatial awareness in surgery. In: Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work, CSCW 2006, pp. 109\u2013118 (2006)","DOI":"10.1145\/1180875.1180892"},{"issue":"2","key":"17_CR3","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1197\/jamia.M2489","volume":"15","author":"D. Aronsky","year":"2008","unstructured":"Aronsky, D., Jones, I., Lanaghan, K., Slovis, C.M.: Supporting patient care in the emergency department with a computerized whiteboard system. Journal of the American Medical Informatics Association\u00a015(2), 184\u2013194 (2008)","journal-title":"Journal of the American Medical Informatics Association"},{"key":"17_CR4","unstructured":"Faxvaag, A., R\u00f8stad, L., T\u00f8ndel, I.A., Seim, A.R., Toussaint, P.J.: Visualizing patient trajectories on wall-mounted boards - information security challenges. In: Proceedings of MIE 2009. Studies in Health Technology and Informatics, pp. 715\u2013719 (2009)"},{"key":"17_CR5","unstructured":"Gj\u00e6re, E.A., T\u00f8ndel, I.A., Line, M.B., Andresen, H., Toussaint, P.: Personal health information on display: Balancing needs, usability and legislative requirements. In: Proceedings of MIE 2011. Studies in Health Technology and Informatics, vol.\u00a0169, pp. 606\u2013610 (2011)"},{"key":"17_CR6","unstructured":"Gj\u00e6re, E.A.: Sensitive Information on Display: Using flexible de-identification for protecting patient privacy in (semi-) public hospital environments, Master\u2019s thesis, Norwegian University of Science and Technology (2011)"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-642-23300-5_3","volume-title":"Availability, Reliability and Security for Business, Enterprise and Health Information Systems","author":"M.B. Line","year":"2011","unstructured":"Line, M.B., T\u00f8ndel, I.A., Gj\u00e6re, E.A.: A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting. In: Tjoa, A.M., Quirchmayr, G., You, I., Xu, L. (eds.) ARES 2011. LNCS, vol.\u00a06908, pp. 26\u201337. Springer, Heidelberg (2011)"},{"key":"17_CR8","unstructured":"Faxvaag, A., Johansen, T.S., Heimly, V., Melby, L., Grimsmo, A.: Healthcare professionals\u2019 experiences with ehr-system access control mechanisms. In: Proceedings of MIE 2011. Studies in Health Technology and Informatics, vol.\u00a0169, pp. 601\u2013605 (2011)"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-642-24279-3_33","volume-title":"Modeling and Using Context","author":"L.W.M. Wienhofen","year":"2011","unstructured":"Wienhofen, L.W.M., Preuveneers, D., Landmark, A.D., Toussaint, P.J., Berbers, Y.: A Notion of Event Quality for Contextualized Planning and Decision Support Systems. In: Beigl, M., Christiansen, H., Roth-Berghofer, T.R., Kofod-Petersen, A., Coventry, K.R., Schmidtke, H.R. (eds.) CONTEXT 2011. LNCS, vol.\u00a06967, pp. 307\u2013320. Springer, Heidelberg (2011)"},{"key":"17_CR10","unstructured":"ANSI, American National Standard for Information Technology - Role Based Access Control, ANSI INCITS 359-2004 (2004)"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Appari, A., Johnson, M.E.: Information security and privacy in healthcare: Current state of research. Forthcoming: International J. Internet and Enterprise Management (2009)","DOI":"10.1504\/IJIEM.2010.035624"},{"key":"17_CR12","unstructured":"Ferreira, A., Cruz-Correira, R., Antunes, L., Chadwick, D.: Access control: how can it improve patients\u2019 healthcare? Studies in Health Technology and Informatics, vol.\u00a0127, pp. 65\u201376 (2007)"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"R\u00f8stad, L., Edsberg, O.: A study of access control requirements for healthcare systems based on audit trails from access logs. In: ACSAC 2006: Proceedings of the 22nd Annual Computer Security Applications Conference, pp. 175\u2013186 (2006)","DOI":"10.1109\/ACSAC.2006.8"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Singh, J., Vargas, L., Bacon, J., Moody, K.: Policy-based information sharing in publish\/subscribe middleware. In: IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 137\u2013144 (2008)","DOI":"10.1109\/POLICY.2008.17"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Bacon, J., Eyers, D.M., Singh, J., Pietzuch, P.R.: Access control in publish\/subscribe systems. In: Proceedings of the Second International Conference on Distributed Event-Based Systems, DEBS 2008, pp. 23\u201334 (2008)","DOI":"10.1145\/1385989.1385993"},{"key":"17_CR16","unstructured":"Hu, J., Weaver, A.: Dynamic, context-aware access control for distributed healthcare applications. In: Proceedings of the First Workshop on Pervasive Security, Privacy and Trust, PSPT (2004)"},{"key":"17_CR17","unstructured":"Alam, M., Hafner, M., Memon, M., Hung, P.: Modeling and enforcing advanced access control policies in healthcare systems with SECTET. In: 1st International Workshop on Model-Based Trustworthy Health Informaton Systems, MOTHIS 2007 (2007)"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K.: Using trust and risk in role-based access control policies. In: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, SACMAT 2004, pp. 156\u2013162 (2004)","DOI":"10.1145\/990036.990062"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/11429760_25","volume-title":"Trust Management","author":"N. Dimmock","year":"2005","unstructured":"Dimmock, N., Bacon, J., Ingram, D., Moody, K.: Risk Models for Trust-Based Access Control(TBAC). In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol.\u00a03477, pp. 364\u2013371. Springer, Heidelberg (2005)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Cheng, P.-C., Fohatgi, P., Keser, C.: Fuzzy MLS: An Experiment on Quantified Risk-Adaptive Access Control, IBM Thomas J. Watson Research Center, Tech. Rep. (January 2007)","DOI":"10.1109\/SP.2007.21"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Diep, N.N., Hung, L.X., Zhung, Y., Lee, S., Lee, Y.-K., Lee, H.: Enforcing access control using risk assessment. In: European Conference on Universal Multiservice Networks, pp. 419\u2013424 (2007)","DOI":"10.1109\/ECUMN.2007.19"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Shoemaker, G.B.D., Inkpen, K.M.: Single display privacyware: augmenting public displays with private information. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2001, pp. 522\u2013529 (2001)","DOI":"10.1145\/365024.365349"},{"key":"17_CR23","unstructured":"Tarasewich, P., Campbell, C.: What are you looking at. In: The First Symposium on Usable Privacy and Security, SOUPS 2005 (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security Technology for Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29615-4_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:10:05Z","timestamp":1620112205000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29615-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642296147","9783642296154"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29615-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}