{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:14:35Z","timestamp":1775837675031,"version":"3.50.1"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2016,10,8]],"date-time":"2016-10-08T00:00:00Z","timestamp":1475884800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s10916-016-0589-z","type":"journal-article","created":{"date-parts":[[2016,10,8]],"date-time":"2016-10-08T07:38:08Z","timestamp":1475912288000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Access control and privilege management in electronic health record: a systematic literature review"],"prefix":"10.1007","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1599-965X","authenticated-orcid":false,"given":"Manoj","family":"Jayabalan","sequence":"first","affiliation":[]},{"given":"Thomas","family":"O\u2019Daniel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,8]]},"reference":[{"key":"589_CR1","unstructured":"NHP Admin, Categories for Adoption of Standards | National Health Portal of India. In: NHP CC DC. http:\/\/hi.nhp.gov.in\/categories-for-adoption-of-standards_mtl . Accessed 19 Aug 2016, 2015."},{"key":"589_CR2","doi-asserted-by":"publisher","unstructured":"Ahamed, S. I., Talukder, N., and Haque, M. M., Privacy challenges in context-sensitive access control for pervasive computing environment. 2007 Fourth Annual Int Conf Mob Ubiquitous Syst Netw Serv 1\u20136. doi: 10.1109\/MOBIQ.2007.4451065 , 2007.","DOI":"10.1109\/MOBIQ.2007.4451065"},{"key":"589_CR3","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.jksuci.2011.05.003","volume":"23","author":"J Al-Muhtadi","year":"2011","unstructured":"Al-Muhtadi, J., Hill, R., and Al-Rwais, S., Access control using threshold cryptography for ubiquitous computing environments. J. King Saud Univ. Comput. Inf. Sci. 23:71\u201378, 2011. doi: 10.1016\/j.jksuci.2011.05.003 .","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"589_CR4","doi-asserted-by":"crossref","unstructured":"Alshehri, S., and Raj, R. K., Secure access control for health information sharing systems. In: 2013 I.E. Int. Conf. Healthc. Informatics. pp 277\u2013286, 2013.","DOI":"10.1109\/ICHI.2013.40"},{"key":"589_CR5","doi-asserted-by":"crossref","unstructured":"Alshugran, T, and Dichter, J., Toward a privacy preserving HIPAA-compliant access control model for web services. In: IEEE Int. Conf. Electro\/Information Technol. pp 163\u2013167, 2014.","DOI":"10.1109\/EIT.2014.6871755"},{"key":"589_CR6","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.knosys.2015.02.004","volume":"79","author":"F Amato","year":"2015","unstructured":"Amato, F., De Pietro, G., Esposito, M., and Mazzocca, N., An integrated framework for securing semi-structured health records. Knowl.-Based Syst. 79:99\u2013117, 2015. doi: 10.1016\/j.knosys.2015.02.004 .","journal-title":"Knowl.-Based Syst."},{"key":"589_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.hlpt.2015.08.007","author":"M Anwar","year":"2015","unstructured":"Anwar, M., Joshi, J., and Tan, J., Anytime, anywhere access to secure, privacy-aware healthcare services: issues: approaches & challenges. Heal Policy Technol, 2015. doi: 10.1016\/j.hlpt.2015.08.007 .","journal-title":"Heal Policy Technol"},{"key":"589_CR8","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1016\/j.cose.2010.07.001","volume":"29","author":"CA Ardagna","year":"2010","unstructured":"Ardagna, C. A., De Capitani di Vimercati, S., Foresti, S., et al., Access control for smarter healthcare using policy spaces. Comput. Secur. 29:848\u2013858, 2010. doi: 10.1016\/j.cose.2010.07.001 .","journal-title":"Comput. Secur."},{"key":"589_CR9","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10207-014-0265-6","volume":"14","author":"H Azkia","year":"2014","unstructured":"Azkia, H., Cuppens-Boulahia, N., Cuppens, F., et al., Deployment of a posteriori access control using IHE ATNA. Int. J. Inf. Secur. 14:471\u2013483, 2014. doi: 10.1007\/s10207-014-0265-6 .","journal-title":"Int. J. Inf. Secur."},{"key":"589_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2015.08.005","author":"S Bhartiya","year":"2015","unstructured":"Bhartiya, S., Mehrotra, D., and Girdhar, A., Proposing hierarchy-similarity based access control framework: a multilevel electronic health record data sharing approach for interoperable environment. J. King Saud Univ. Comput. Inf. Sci. 2015. doi: 10.1016\/j.jksuci.2015.08.005 .","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"589_CR11","doi-asserted-by":"crossref","unstructured":"Bhatti, R., Moidu, K., and Ghafoor, A., Policy-based security management for federated healthcare databases (or RHIOs). In: Proc. Int. Work. Healthc. Inf. Knowl. Manag. - HIKM \u201906. p 41, 2006.","DOI":"10.1145\/1183568.1183577"},{"key":"589_CR12","doi-asserted-by":"crossref","unstructured":"Boonyarattaphan, A., Bai, Y., Chung, S., and Poovendran, R. Spatial-temporal access control for E-health services. In: 2010 I.E. Fifth Int. Conf. Networking, Archit. Storage. pp 269\u2013276, 2010.","DOI":"10.1109\/NAS.2010.38"},{"key":"589_CR13","unstructured":"BS EN ISO 22600-1:2014, BS EN ISO 22600-1:2014: health informatics. Privilege management and access control. Overview and policy management. Br. Stand. Institute, 2014."},{"key":"589_CR14","doi-asserted-by":"crossref","unstructured":"Burnett, C, Chen, L, Edwards, P, and Norman, T. J., TRAAC\u202f: trust and risk aware access control. In: Twelfth Annu. Conf. Privacy, Secur. Trust. pp 371\u2013378, 2014.","DOI":"10.1109\/PST.2014.6890962"},{"key":"589_CR15","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.ijmedinf.2009.12.007","volume":"79","author":"K Chen","year":"2010","unstructured":"Chen, K., Chang, Y.-C., and Wang, D.-W., Aspect-oriented design and implementation of adaptable access control for electronic medical records. Int. J. Med. Inform. 79:181\u2013203, 2010. doi: 10.1016\/j.ijmedinf.2009.12.007 .","journal-title":"Int. J. Med. Inform."},{"key":"589_CR16","doi-asserted-by":"crossref","unstructured":"Chi, H, Jones, E. L., and Zhao, L. Implementation of a security access control model for inter-organizational healthcare information systems. In: Proc. 3rd IEEE Asia-Pacific Serv. Comput. Conf. APSCC 2008. pp 692\u2013696, 2008.","DOI":"10.1109\/APSCC.2008.256"},{"key":"589_CR17","doi-asserted-by":"publisher","unstructured":"Choi, S., Gutierrez, C., Lim, H.-S., et al., Secure and resilient proximity-based access control. Proc 2013 Int Work Data Manag Anal Healthc - DARE \u201913 15\u201320. doi: 10.1145\/2512410.2512425 .","DOI":"10.1145\/2512410.2512425"},{"key":"589_CR18","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1007\/978-1-4471-6732-7_18","volume-title":"Hist. Med. informatics United States, part IV","author":"MF Collen","year":"2015","unstructured":"Collen, M. F., and Greenes, R. A., Medical informatics: past and future. In: Morris, F., and Collen, M. J. B. (Eds.), Hist. Med. informatics United States, part IV. Springer, London, pp. 725\u2013748, 2015."},{"key":"589_CR19","doi-asserted-by":"crossref","unstructured":"Dillema, F. W., and Lupetti, S. Rendezvous-based access control for medical records in the pre-hospital environment. In: Proc. 1st ACM SIGMOBILE Int. Work. Syst. Netw. Support Healthc. Assist. living Environ. - Heal. \u201907. p 1, 2007.","DOI":"10.1145\/1248054.1248057"},{"key":"589_CR20","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1016\/j.ijmedinf.2015.09.006","volume":"84","author":"EV Eikey","year":"2015","unstructured":"Eikey, E. V., Murphy, A. R., Reddy, M. C., and Xu, H., Designing for privacy management in hospitals: Understanding the gap between user activities and IT staff\u2019s understandings. Int. J. Med. Inform. 84:1065\u20131075, 2015. doi: 10.1016\/j.ijmedinf.2015.09.006 .","journal-title":"Int. J. Med. Inform."},{"key":"589_CR21","doi-asserted-by":"crossref","unstructured":"El-Aziz, A. A. A., and Kannan, A. Access control for healthcare data using extended XACML-SRBAC model. In: 2012 Int. Conf. Comput. Commun. Informatics. pp 1\u20134, 2012.","DOI":"10.1109\/ICCCI.2012.6158775"},{"key":"589_CR22","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/S1361-3723(02)01211-3","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D. F., Kuhn, D. R., and Chandramouli, R., Role-based access control. ACM Trans. Inf. Syst. Secur. 4:224\u2013274, 2001. doi: 10.1016\/S1361-3723(02)01211-3 .","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"589_CR23","unstructured":"Ferreira, A., Chadwick, D., and Farinha, P., et al., How to securely break into RBAC: the BTG-RBAC model. In: 2009 Annu. Comput. Secur. Appl. Conf. pp 23\u201331, 2009."},{"key":"589_CR24","doi-asserted-by":"crossref","unstructured":"Ferreira, A., Correia, R., Brito, M., and Antunes, L., Usable access control policy and model for healthcare. In: 2011 24th Int. Symp. Comput. Med. Syst. pp 1\u20136, 2011.","DOI":"10.1109\/CBMS.2011.5999035"},{"key":"589_CR25","doi-asserted-by":"crossref","unstructured":"Ferreira, A., Cruz-Correia, R., Antunes, L., et al., How to break access control in a controlled manner. In: Proc. - IEEE Symp. Comput. Med. Syst. pp 847\u2013851, 2006.","DOI":"10.1109\/CBMS.2006.95"},{"key":"589_CR26","unstructured":"Georgakakis, E., Nikolidakis S. A., Vergados D. D., and Douligeris, C., Spatio temporal emergency role based access control (STEM-RBAC): a time and location aware role based access control model with a break the glass mechanism. In: IEEE Symp. Comput. Commun. IEEE, Kerkyra, pp 764\u2013770, 2011."},{"key":"589_CR27","unstructured":"Henzi, D., International delegates meeting report. http:\/\/www.standards.org.au\/StandardsDevelopment\/accreditation\/Documents\/SDAC-011_International_Delegates_Meeting_Report_for_Accredited_SDOs.pdf . Accessed 20 Aug 2016, 2015."},{"key":"589_CR28","doi-asserted-by":"publisher","first-page":"162","DOI":"10.6028\/NIST.SP.800-162","volume":"800","author":"VC Hu","year":"2014","unstructured":"Hu, V. C., Ferraiolo, D., Kuhn, R., et al., Guide to attribute based access control (abac) definition and considerations. NIST Spec. Publ. 800:162, 2014. doi: 10.6028\/NIST.SP.800-162 .","journal-title":"NIST Spec. Publ."},{"key":"589_CR29","unstructured":"ISO - Technical committees - ISO_TC 215 - Health informatics. http:\/\/www.iso.org\/iso\/iso_technical_committee?commid=54960 . Accessed 20 Aug 2016."},{"key":"589_CR30","unstructured":"ITI Planning Committee, IHE information technology infrastructure. http:\/\/ihe.net\/uploadedFiles\/Documents\/ITI\/IHE_ITI_WP_HITStdsforHIMPratices_Rev1.1_2015-09-18.pdf . Accessed 20 Aug 2016, 2015."},{"key":"589_CR31","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.cose.2006.05.004","volume":"25","author":"V Kapsalis","year":"2006","unstructured":"Kapsalis, V., Hadellis, L., Karelis, D., and Koubias, S., A dynamic context-aware access control architecture for e-services. Comput. Secur. 25:507\u2013521, 2006. doi: 10.1016\/j.cose.2006.05.004 .","journal-title":"Comput. Secur."},{"key":"589_CR32","doi-asserted-by":"crossref","unstructured":"Kayes, A. S. M., Han, J., and Colman, A., PO-SAAC\u202f: a purpose-oriented situation-aware access control framework for software services. Adv. Inf. Syst. Eng. Springer. Int. Publ. 58\u201374, 2014.","DOI":"10.1007\/978-3-319-07881-6_5"},{"key":"589_CR33","doi-asserted-by":"crossref","unstructured":"Khan, A., and McKillop, I. Privacy-centric access control for distributed heterogeneous medical information systems. In: 2013 I.E. Int. Conf. Healthc. Informatics. pp 297\u2013306, 2013.","DOI":"10.1109\/ICHI.2013.42"},{"key":"589_CR34","doi-asserted-by":"publisher","unstructured":"Khan, M. F. F, and Sakamura, K., Context-awareness: exploring the imperative shared context of security and ubiquitous computing. Proc 14th Int Conf Inf Integr Web-based Appl Serv 101\u2013110. doi: 10.1145\/2428736.2428755 , 2012.","DOI":"10.1145\/2428736.2428755"},{"key":"589_CR35","doi-asserted-by":"crossref","unstructured":"Khan, M. F. F., and Sakamura, K., Fine-grained access control to medical records in digital healthcare enterprises. In: 2015 Int. Symp. Networks, Comput. Commun. pp 1\u20136, 2015.","DOI":"10.1109\/ISNCC.2015.7238590"},{"key":"589_CR36","doi-asserted-by":"crossref","unstructured":"Kuang, T., and Ibrahim, H., Security privacy access control for policy integration and conflict reconciliation in health care organizations collaborations. In: Proc. 11th Int. Conf. Inf. Integr. Web-based Appl. Serv. pp 750\u2013754, 2009.","DOI":"10.1145\/1806338.1806480"},{"key":"589_CR37","doi-asserted-by":"publisher","first-page":"2979","DOI":"10.1016\/j.ins.2010.04.020","volume":"180","author":"XH Le","year":"2010","unstructured":"Le, X. H., Lee, S., Lee, Y.-K., et al., Activity-oriented access control to ubiquitous hospital information and services. Inf. Sci. 180:2979\u20132990, 2010. doi: 10.1016\/j.ins.2010.04.020 .","journal-title":"Inf. Sci."},{"key":"589_CR38","doi-asserted-by":"crossref","unstructured":"Li, J., Bai, Y., and Zaman, N., A fuzzy modeling approach for risk-based access control in eHealth cloud. In: Proc. - 12th IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. Trust. 2013. pp 17\u201323, 2013.","DOI":"10.1109\/TrustCom.2013.66"},{"key":"589_CR39","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.jnca.2013.06.006","volume":"38","author":"Z Li","year":"2014","unstructured":"Li, Z., Chu, C.-H. H., and Yao, W., A semantic authorization model for pervasive healthcare. J. Netw. Comput. Appl. 38:76\u201387, 2014. doi: 10.1016\/j.jnca.2013.06.006 .","journal-title":"J. Netw. Comput. Appl."},{"key":"589_CR40","doi-asserted-by":"publisher","first-page":"S7","DOI":"10.1186\/1471-2105-12-S12-S7","volume":"12","author":"F Li","year":"2011","unstructured":"Li, F., Zou, X., Liu, P., and Chen, J. Y., New threats to health data privacy. BMC Bioinf. 12:S7, 2011. doi: 10.1186\/1471-2105-12-S12-S7 .","journal-title":"BMC Bioinf."},{"key":"589_CR41","doi-asserted-by":"publisher","first-page":"W65","DOI":"10.1371\/journal.pmed.1000100","volume":"151","author":"A Liberati","year":"2009","unstructured":"Liberati, A., Altman, D. G., Tetzlaff, J., et al., Annals of internal medicine academia and clinic the PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions. Ann. Intern. Med. 151:W65\u2013W94, 2009. doi: 10.1371\/journal.pmed.1000100 .","journal-title":"Ann. Intern. Med."},{"key":"589_CR42","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s10207-010-0106-1","volume":"9","author":"D Lin","year":"2010","unstructured":"Lin, D., Rao, P., Bertino, E., et al., EXAM: a comprehensive environment for the analysis of access control policies. Int. J. Inf. Secur. 9:253\u2013273, 2010. doi: 10.1007\/s10207-010-0106-1 .","journal-title":"Int. J. Inf. Secur."},{"key":"589_CR43","doi-asserted-by":"crossref","unstructured":"Mallare, I. J. G., and Pancho-Festin, S., Combining task- and role-based access control with multi-constraints for a medical workflow system. In: 2013 Int. Conf. IT Converg. Secur. ICITCS 2013. pp 0\u20133, 2013.","DOI":"10.1109\/ICITCS.2013.6717814"},{"key":"589_CR44","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s12243-013-0365-8","volume":"69","author":"S Oulmakhzoune","year":"2014","unstructured":"Oulmakhzoune, S., Cuppens-Boulahia, N., Cuppens, F., et al., Privacy query rewriting algorithm instrumented by a privacy-aware access control model. Ann. Telecommun. 69:3\u201319, 2014. doi: 10.1007\/s12243-013-0365-8 .","journal-title":"Ann. Telecommun."},{"key":"589_CR45","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1016\/j.jbi.2008.03.014","volume":"41","author":"M Peleg","year":"2008","unstructured":"Peleg, M., Beimel, D., Dori, D., and Denekamp, Y., Situation-based access control: privacy management via modeling of patient data access scenarios. J. Biomed. Inform. 41:1028\u20131040, 2008. doi: 10.1016\/j.jbi.2008.03.014 .","journal-title":"J. Biomed. Inform."},{"key":"589_CR46","unstructured":"Rashid, A., Kim, I. K., and Khan, O. A., Providing authorization interoperability using rule based HL7 RBAC for CDR (Clinical Data Repository) framework. In: Proc. 2015 12th Int. Bhurban Conf. Appl. Sci. Technol. IBCAST 2015. pp 343\u2013348, 2015."},{"key":"589_CR47","unstructured":"Record C on I the P, Medicine I of, The computer-based patient record: an essential technology for health care, revised edition. National Academies Press, 1997."},{"key":"589_CR48","doi-asserted-by":"crossref","unstructured":"R\u00f8stad, L., and Nytro, O., Personalized access control for a personally controlled health record. In: Sci. Technol. pp 9\u201315, 2008.","DOI":"10.1145\/1456508.1456511"},{"key":"589_CR49","unstructured":"Samarati, P., and Di Vimercati, S. D. C., Access control: policies, models, and mechanisms. In: Found. Secur. Anal. Des. pp 137\u2013196, 2001."},{"key":"589_CR50","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-642-40093-3","volume":"8060","author":"C Santos-Pereira","year":"2013","unstructured":"Santos-Pereira, C., Augusto, A. B., Cruz-Correia, R., and Correia, M. E., A secure RBAC mobile agent model for healthcare institutions-preliminary study. Inf. Technol. Biomed. Informatics 8060:108\u2013111, 2013. doi: 10.1007\/978-3-642-40093-3 .","journal-title":"Inf. Technol. Biomed. Informatics"},{"key":"589_CR51","doi-asserted-by":"crossref","unstructured":"Saripalle, R. K., De la Rosa Algarin, A., and Ziminski, T. B., Towards knowledge level privacy and security using RDF \/ RDFS and RBAC. In: 2015 I.E. 9th Int. Conf. Semant. Comput. (IEEE ICSC 20 IS). pp 264\u2013267, 2015.","DOI":"10.1109\/ICOSC.2015.7050817"},{"key":"589_CR52","doi-asserted-by":"crossref","unstructured":"Sicuranza, M., and Ciampi, M., A semantic access control for easy management of the privacy for EHR systems. In: Int. Conf. P2P, Parallel, Grid, Cloud Internet Comput. pp 400\u2013405, 2014.","DOI":"10.1109\/3PGCIC.2014.84"},{"key":"589_CR53","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/s12652-015-0275-x","volume":"6","author":"M Sicuranza","year":"2015","unstructured":"Sicuranza, M., Esposito, A., and Ciampi, M., An access control model to minimize the data exchange in the information retrieval. J. Ambient. Intell. Humaniz. Comput. 6:741\u2013752, 2015. doi: 10.1007\/s12652-015-0275-x .","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"589_CR54","doi-asserted-by":"publisher","first-page":"S123","DOI":"10.3233\/THC-151059","volume":"24","author":"J Son","year":"2016","unstructured":"Son, J., Kim, J.-D., Na, H.-S., and Baik, D.-K., Dynamic access control model for privacy preserving personalized healthcare in cloud environment. Technol. Health Care 24:S123\u2013S129, 2016. doi: 10.3233\/THC-151059 .","journal-title":"Technol. Health Care"},{"key":"589_CR55","doi-asserted-by":"publisher","first-page":"S46","DOI":"10.1016\/j.jbi.2010.08.001","volume":"43","author":"WV Sujansky","year":"2010","unstructured":"Sujansky, W. V., Faus, S. A., Stone, E., and Brennan, P. F., A method to implement fine-grained access control for personal health records through standard relational database queries. J. Biomed. Inform. 43:S46\u2013S50, 2010. doi: 10.1016\/j.jbi.2010.08.001 .","journal-title":"J. Biomed. Inform."},{"key":"589_CR56","doi-asserted-by":"crossref","unstructured":"Sun, L., and Wang, H. A purpose based usage access control model. In: Int. J. Comput. Inf. Eng. pp 44\u201351, 2010.","DOI":"10.1109\/ICDKE.2011.6053928"},{"key":"589_CR57","doi-asserted-by":"crossref","unstructured":"Sun, L., Wang, H., Yong, J., and Wu, G., Semantic access control for cloud computing based on e-Healthcare. In: Proc. 2012 I.E. 16th Int. Conf. Comput. Support. Coop. Work Des. CSCWD 2012. pp 512\u2013518, 2012.","DOI":"10.1109\/CSCWD.2012.6221866"},{"key":"589_CR58","doi-asserted-by":"publisher","first-page":"3019","DOI":"10.1007\/s10916-011-9779-x","volume":"36","author":"A Tejero","year":"2012","unstructured":"Tejero, A., and De La Torre, I., Advances and current state of the security and privacy in electronic health records: survey from a social perspective. J. Med. Syst. 36:3019\u20133027, 2012. doi: 10.1007\/s10916-011-9779-x .","journal-title":"J. Med. Syst."},{"key":"589_CR59","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.knosys.2012.04.009","volume":"35","author":"PTT Thuy","year":"2012","unstructured":"Thuy, P. T. T., Lee, Y. K., and Lee, S., S-trans: semantic transformation of XML healthcare data into OWL ontology. Knowl.-Based Syst. 35:349\u2013356, 2012. doi: 10.1016\/j.knosys.2012.04.009 .","journal-title":"Knowl.-Based Syst."},{"key":"589_CR60","doi-asserted-by":"crossref","unstructured":"Vieira-Marques, P. M., Patriarca-Almeida, J. H., Frade, S., et al., OpenEHR aware multi agent system for inter- institutional health data integration. In: Inf. Syst. Technol. (CISTI), 2014 9th Iber. Conf. pp 683\u2013688, 2014.","DOI":"10.1109\/CISTI.2014.6876864"},{"key":"589_CR61","doi-asserted-by":"publisher","unstructured":"Wang, Q., and Jin, H., Quantified risk-adaptive access control for patient privacy protection in health information systems. Proc 6th ACM Symp Information, Comput Commun Secur - ASIACCS \u201911 406. doi: 10.1145\/1966913.1966969 , 2011.","DOI":"10.1145\/1966913.1966969"},{"key":"589_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3233\/JCS-2012-0454","volume":"21","author":"MH Yarmand","year":"2013","unstructured":"Yarmand, M. H., Sartipi, K., and Down, D. G., Behavior-based access control for distributed healthcare systems. J. Comput. Secur. 21:1\u201339, 2013. doi: 10.3233\/JCS-2012-0454 .","journal-title":"J. Comput. Secur."},{"key":"589_CR63","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Chiu, D. K. W., Wang, H., and Hung, P. C. K. Towards a privacy policy enforcement middleware with location intelligence. In: Elev. Int. IEEE EDOC Conf. Work. 2007. EDOC \u201907. pp 97\u2013104, 2007.","DOI":"10.1109\/EDOCW.2007.32"},{"key":"589_CR64","doi-asserted-by":"crossref","unstructured":"Zickau, S., Thatmann, D., Ermakova, T., and Repschl, J., Enabling location-based policies in a healthcare cloud computing environment. In: IEEE 3rd Int. Conf. Cloud Netw. Enabling. pp 333\u2013338, 2014.","DOI":"10.1109\/CloudNet.2014.6969017"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0589-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0589-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0589-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T23:34:22Z","timestamp":1657409662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0589-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,8]]},"references-count":64,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["589"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0589-z","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,8]]},"article-number":"261"}}