{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:07:11Z","timestamp":1760044031055},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T00:00:00Z","timestamp":1475107200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s10916-016-0620-4","type":"journal-article","created":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T03:00:19Z","timestamp":1475118019000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data"],"prefix":"10.1007","volume":"40","author":[{"given":"Prosanta","family":"Gope","sequence":"first","affiliation":[]},{"given":"Ruhul","family":"Amin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,29]]},"reference":[{"issue":"9","key":"620_CR1","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"RS Sandhu","year":"1994","unstructured":"Sandhu, R.S., and Samarati, P., Access control: principle and practice. IEEE Commun. Mag. 32(9):40\u201348, 1994.","journal-title":"IEEE Commun. Mag."},{"key":"620_CR2","unstructured":"Ferraiolo, D.F., and Kuhn, D.R., Role Based Access Control, In: 15th National Computer Security Conf, 554\u2013563, 1992."},{"issue":"2","key":"620_CR3","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., et al., Role-based access control models. Computer. 29(2):38\u201347, 1996.","journal-title":"Computer"},{"key":"620_CR4","unstructured":"NIST. Role Based Access Control, National Institute of Standards and Technology, 1999, available in URL: http:\/\/hissa.ncsl.nist.gov\/rbac."},{"issue":"3","key":"620_CR5","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., et al., Proposed NIST standard for Role-based Access Control. ACM Trans. Inf. Syst. Secur. (TISSEC). 4(3):224\u2013274, 2001.","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"620_CR6","doi-asserted-by":"crossref","unstructured":"Sandhu, R. S. et al., The NIST model for role based access control: Toward a Unified Standard, In: Proc. 5th ACM Workshop on Role Based Access Control, New York, pp: 47\u201363, 2000.","DOI":"10.1145\/344287.344301"},{"key":"620_CR7","doi-asserted-by":"crossref","unstructured":"Thomas, R. K., Team-based Access Control (TMAC): A primitive for applying role-based access controls in collaborative environments\u201d, In: Proc. 2nd ACM Workshop on Role based Access Control, New York, pp. 13\u201319, 1997.","DOI":"10.1145\/266741.266748"},{"key":"620_CR8","doi-asserted-by":"crossref","unstructured":"Joshi, J.B.D. et al., A generalized temporal role-based access control model, In Knowledge and Data Engineering IEEE Transactions, pp. 4\u201323, 2005.","DOI":"10.1109\/TKDE.2005.1"},{"key":"620_CR9","doi-asserted-by":"crossref","unstructured":"Kulkarni, D., and Tripathi, A., Context-aware role-based access control in pervasive computing systems, In: Proc. 13th ACM Symp. on Access Control Models and Technologies, New York, pp: 113\u2013122, 2008.","DOI":"10.1145\/1377836.1377854"},{"key":"620_CR10","doi-asserted-by":"crossref","unstructured":"Bertino, E. et al., GEORBAC: A Spatially Aware RBAC, In: Proc. 10th ACM Symp. on Access Control Models and Technologies, New York, pp. 29\u201337, 2005.","DOI":"10.1145\/1063979.1063985"},{"key":"620_CR11","doi-asserted-by":"crossref","unstructured":"Bertino, E. et al., TRBAC: A temporal role based access control model, In: ACM Transactions on Information and System Security (TISSEC), pp. 191\u2013233, 2001.","DOI":"10.1145\/501978.501979"},{"key":"620_CR12","unstructured":"Covington, M. J., Generalized role based access control for securing future applications, In: Proc. of the Nat. Information Systems Security Conf., 2000."},{"key":"620_CR13","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1007\/11847366_59","volume-title":"High Performance Computing and Communications","author":"SH Park","year":"2006","unstructured":"Park, S.H., et al., Context-role based access control for context-aware application. In: High Performance Computing and Communications. Springer Berlin, Heidelberg, pp. 572\u2013580, 2006."},{"key":"620_CR14","doi-asserted-by":"crossref","unstructured":"Moyer, M. J. and Ahamad, M., Generalized role-based access control\u201d, In: Proc. of the 21st IEEE Int. Conf. on Distributed Computing Systems, Mesa, AZ, pp. 391\u2013398, 2001.","DOI":"10.1109\/ICDSC.2001.918969"},{"key":"620_CR15","doi-asserted-by":"crossref","unstructured":"Motta, G. et al., A contextual role-based access control authorization model for electronic patient record, In: Information Technology in Biomedicine, IEEE Transactions, , pp. 202\u2013207, 2001.","DOI":"10.1109\/TITB.2003.816562"},{"key":"620_CR16","first-page":"61","volume-title":"Computer Security Basics","author":"D Russell","year":"2006","unstructured":"Russell, D., and Gangemi, G.T., Computer System Security and Access Control. In: Computer Security Basics, 2nd edn. O\u2019Reilly, California, pp. 61\u201369, 2006 ch.3.","edition":"2nd"},{"key":"620_CR17","doi-asserted-by":"crossref","unstructured":"Georgiadis, C.K. et al., Flexible team-based access control using contexts, In: Proc. 6th ACM Symp. on Access Control Models and Technologies, New York, pp. 21\u201327, 2001.","DOI":"10.1145\/373256.373259"},{"key":"620_CR18","unstructured":"Karp, A.H. et al, From ABAC to ZBAC: the evolution of access control models In: Hewlett-Packard Development Company, LP 21, 2009."},{"issue":"6","key":"620_CR19","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1109\/MC.2010.155","volume":"43","author":"DR Kuhn","year":"2010","unstructured":"Kuhn, D.R., et al., Adding attribute to role-based access control. Computer. 43(6):79\u201381, 2010.","journal-title":"Computer"},{"key":"620_CR20","doi-asserted-by":"crossref","unstructured":"Pelega, M., et al., Situation-based access control: privacy management via modeling of patient data access scenarios. J. Biomed. Inform.:1028\u20131040, 2008.","DOI":"10.1016\/j.jbi.2008.03.014"},{"key":"620_CR21","unstructured":"Rissanen, E. et al., Towards a Mechanism for Discretionary Overriding of Access Control, In: Proc. 12th Int. Workshop on Security Protocols, Cambridge, 2004."},{"key":"620_CR22","doi-asserted-by":"crossref","unstructured":"Povey, D., Optimistic security: a new access control paradigm, In: Proc. 1999 workshop on New Security Paradigms, ACM Press, pp. 40\u201345, 2000.","DOI":"10.1145\/335169.335188"},{"key":"620_CR23","doi-asserted-by":"crossref","unstructured":"Ferreira, A. et al., How to break access control in a controlled manner, In: Proc. 19th IEEE Symp. on Computer-Based Medical Systems, pp. 847\u2013851, 2006.","DOI":"10.1109\/CBMS.2006.95"},{"key":"620_CR24","unstructured":"Break-glass: An approach to granting emergency access to healthcare systems, White paper, Joint \u2013NEMA\/COCIR\/JIRA Security and Privacy Committee (SPC), 2004."},{"issue":"1","key":"620_CR25","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.pmcj.2011.01.004","volume":"8","author":"Y Juan","year":"2012","unstructured":"Juan, Y., Simon, D., and Susan, M., Situation identification techniques in pervasive computing: a review. Pervasive Mob. Comput. 8(1):36\u201366, 2012.","journal-title":"Pervasive Mob. Comput."},{"key":"620_CR26","doi-asserted-by":"publisher","unstructured":"Zhang, R., Liu, L., and Xue, R., Role-based and time-bound access and management of EHR data, Security and Communication Networks, doi: 10.1002\/sec , 2010.","DOI":"10.1002\/sec"},{"key":"620_CR27","doi-asserted-by":"crossref","unstructured":"Schefer-Wenzl, S. and Strembeck, M., Generic support for RBAC breakglass policies in process-aware information systems. Proceedings of the 28th Annual ACM Symposium on Applied Computing, pages 1441\u20131446, 2013.","DOI":"10.1145\/2480362.2480631"},{"key":"620_CR28","doi-asserted-by":"crossref","unstructured":"Rostad, L., An Initial Model and a Discussion of Access Control inPatient Controlled Health Records\u201d, In: The 3rd Int. Conf. on Availability, Reliability and Security, pp. 935\u2013942, 2008.","DOI":"10.1109\/ARES.2008.185"},{"issue":"2","key":"620_CR29","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1197\/jamia.M0978","volume":"9","author":"MI Kim","year":"2002","unstructured":"Kim, M.I., and Johnson, K.B., Personal health records: evaluation of functionality and utility. J. Am. Med. Inform. Assoc. 9(2):171\u2013180, 2002.","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"8","key":"620_CR30","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1016\/j.cose.2010.07.001","volume":"29","author":"CA Ardagna","year":"2010","unstructured":"Ardagna, C.A., et al., Access control for smarter healthcare using policy spaces. Computers & Security. 29(8):848\u2013858, 2010.","journal-title":"Computers & Security"},{"key":"620_CR31","doi-asserted-by":"crossref","unstructured":"Zhao, G. et al., Obligation for Role Based Access Control, In: IEEE Int. Symp. on Security in Networks and Distributed Systems (SSNDS07), 2007.","DOI":"10.1109\/AINAW.2007.267"},{"key":"620_CR32","doi-asserted-by":"publisher","unstructured":"Ferreira, A. et al., How to Securely Break into RBAC: The BTG-RBAC Model, Computer Security Applications Conference, 2009. ACSAC \u201809. Annual, Honolulu, pp. 23\u201331, 2009. doi: 10.1109\/ACSAC.2009.12","DOI":"10.1109\/ACSAC.2009.12"},{"key":"620_CR33","doi-asserted-by":"crossref","unstructured":"Maw, H. A., Xiao, H., Christianson, B., Malcolm, J. A. An evaluation of break-the-glass access control model for medical data in wireless sensor networks, e-Health Networking, Applications and Services (Healthcom), IEEE 16th International Conference on, On page(s): pp. 130\u2013135, 2014.","DOI":"10.1109\/HealthCom.2014.7001829"},{"key":"620_CR34","doi-asserted-by":"crossref","unstructured":"Adriansyah, A., van Dongen, B-F., Zannone, N., Controlling Break-the-Glass through Alignment. SocialCom, pp. 606\u2013611, 2013.","DOI":"10.1109\/SocialCom.2013.91"},{"key":"620_CR35","unstructured":"Randike, G., Iannella, R., and Sahama, T.,Privacy oriented access control for electronic health records. electronic Journal of Health Informatics 8.2 (2014): 15."},{"key":"620_CR36","doi-asserted-by":"crossref","unstructured":"P. Gope, T. Hwang, \u201cBSN-Care: A Secure IoT-based Modern Healthcare System Using Body Sensor Network,\u201d IEEE Sensors Journal, Vol. 16 (5), pp. 1368\u20131376, 2016.","DOI":"10.1109\/JSEN.2015.2502401"},{"key":"620_CR37","doi-asserted-by":"crossref","unstructured":"Amin, R., Biswas, G. P., A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS, J. Medical Systems 39(3) 2015.","DOI":"10.1007\/s10916-015-0217-3"},{"key":"620_CR38","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2544805","author":"D He","year":"2016","unstructured":"He, D., Zeadally, S., Kumar, N., and Lee, J.H., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J., 2016. doi: 10.1109\/JSYST.2016.2544805 .","journal-title":"IEEE Syst. J."},{"key":"620_CR39","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2428620","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., and Wu, L., Certificatelesspublic auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J., 2015. doi: 10.1109\/JSYST.2015.2428620 .","journal-title":"IEEE Syst. J."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0620-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0620-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0620-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T23:11:10Z","timestamp":1568416270000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0620-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,29]]},"references-count":39,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["620"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0620-4","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,29]]},"article-number":"242"}}