{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T06:57:50Z","timestamp":1725778670359},"reference-count":14,"publisher":"Elsevier BV","issue":"2-3","license":[{"start":{"date-parts":[[2003,7,1]],"date-time":"2003-07-01T00:00:00Z","timestamp":1057017600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Medical Informatics"],"published-print":{"date-parts":[[2003,7]]},"DOI":"10.1016\/s1386-5056(03)00031-5","type":"journal-article","created":{"date-parts":[[2003,6,30]],"date-time":"2003-06-30T17:29:01Z","timestamp":1056994141000},"page":"161-171","source":"Crossref","is-referenced-by-count":7,"title":["Healthcare teams over the Internet: programming a certificate-based approach"],"prefix":"10.1016","volume":"70","author":[{"given":"Christos K","family":"Georgiadis","sequence":"first","affiliation":[]},{"given":"Ioannis K","family":"Mavridis","sequence":"additional","affiliation":[]},{"given":"George I","family":"Pangalos","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1386-5056(03)00031-5_BIB1","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/S1386-5056(00)00112-X","article-title":"Health care management and information systems security: awareness, training or education","volume":"60","author":"Katsikas","year":"2000","journal-title":"Int. J. Med. Informatics"},{"key":"10.1016\/S1386-5056(03)00031-5_BIB2","unstructured":"Department of Health and Human Services (USA), The HCFA Internet Communications Security and Appropriate Use Policy and Guidelines, Health Care Financing Administration, Office of Information Services, Security and Standards Group, February 1999, http:\/\/www.hcfa.gov\/security\/isecplcy.htm."},{"key":"10.1016\/S1386-5056(03)00031-5_BIB3","unstructured":"ITU-T Recommendation X.509. Information Technology: Open Systems Interconnection\u2014The Directory: Public Key and Attribute Certificate Frameworks, 2000, ISO\/IEC 9594-8:2001."},{"key":"10.1016\/S1386-5056(03)00031-5_BIB4","unstructured":"I. Mavridis, C.K. Georgiadis, G. Pangalos, M. Khair, Using Digital Certificates for Access Control in Clinical Intranet Applications, book edition of J. Technol. Health Care, vol. 8, Nos. 3, 4 (2000), ISSN 0928-7329, IOS Press, pp. 173\u2013174."},{"key":"10.1016\/S1386-5056(03)00031-5_BIB5","doi-asserted-by":"crossref","unstructured":"R.K. Thomas, Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments, in: Proceedings of the Second ACM Workshop on Role-Based Access Control (RBAC 97), Fairfax, VA, USA, 6\u20137 November, 1997, pp. 13\u201319.","DOI":"10.1145\/266741.266748"},{"key":"10.1016\/S1386-5056(03)00031-5_BIB6","doi-asserted-by":"crossref","unstructured":"C.K. Georgiadis, I. Mavridis, G. Pangalos, R.K. Thomas, Flexible team-based access control using contexts, in: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, VA, USA, May 2001, pp. 21\u201327.","DOI":"10.1145\/373256.373259"},{"key":"10.1016\/S1386-5056(03)00031-5_BIB7","doi-asserted-by":"crossref","unstructured":"C.K. Georgiadis, I. Mavridis, G. Pangalos, Implementing Context and Team Based Access Control in Healthcare Intranets, International Journal of Health Care Engineering \u201cTechnology and Health Care\u201d (book edition), vol. 9, Number 6 (2001), ISSN 0928-7329, IOS Press, Special Issue: Abstracts of the Sixth World Congress on the Internet in Medicine (MEDNET 2001), Udine, Italy, December 2001.","DOI":"10.3233\/THC-2001-9601"},{"key":"10.1016\/S1386-5056(03)00031-5_BIB8","unstructured":"The Computer-based Patient Record Institute. Description of the Computer-Based Patient Record (CPR) and Computer-Based Patient Record System. Prepared by the CPRI Work Group on CPR Description (WDES). http:\/\/www.cpri.org\/resource\/docs\/hldd.html; May 1995."},{"key":"10.1016\/S1386-5056(03)00031-5_BIB9","doi-asserted-by":"crossref","unstructured":"J. Grimson, W. Grimson, W. Hasselbring, The System Integration (SI) Challenge in Health Care, Communications of the ACM. June 2000, vol. 43, No. 6, pp. 49\u201355.","DOI":"10.1145\/336460.336474"},{"key":"10.1016\/S1386-5056(03)00031-5_BIB10","unstructured":"C.K. Georgiadis, I. Mavridis, G. Pangalos, Context and role based hybrid access control for collaborative environments, in: Proceedings of the Fifth Nordic Workshop on Secure IT Systems-Encouraging Co-operation (NORDSEC 2000), Reykjavik, Iceland, 12\u201313 October 2000, pp. 225\u2013238."},{"key":"10.1016\/S1386-5056(03)00031-5_BIB11","doi-asserted-by":"crossref","unstructured":"R. Sandhu, D. Ferraiolo, R. Kuhn, The NIST model for role-based access control: towards a unified standard, in: Proceedings of the Fifth ACM Workshop on Role-Based Access Control (RBAC 2000), Technical University of Berlin, Berlin, Germany, 26\u201328 July 2000, pp. 47\u201363.","DOI":"10.1145\/344287.344301"},{"key":"10.1016\/S1386-5056(03)00031-5_BIB12","doi-asserted-by":"crossref","unstructured":"I. Mavridis, G. Pangalos, M. Khair, eMEDAC: role-based access control supporting discretionary and mandatory features, in: Proceedings of 13th IFIP WG 11.3 Working Conference on Database Security, Seattle, WA, USA, 25\u201328 July 1999, pp. 55\u201363.","DOI":"10.1007\/978-0-387-35508-5_5"},{"key":"10.1016\/S1386-5056(03)00031-5_BIB13","volume":"46","author":"Sandhu","year":"1998"},{"key":"10.1016\/S1386-5056(03)00031-5_BIB14","doi-asserted-by":"crossref","unstructured":"W. Johnston, S. Mudumbai, M. Thompson, Authorization and attribute certificates for widely distributed access control, in: Proceedings of IEEE Seventh International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE '98), Stanford, USA, 1998.","DOI":"10.1109\/ENABL.1998.725715"}],"container-title":["International Journal of Medical Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1386505603000315?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1386505603000315?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T16:17:25Z","timestamp":1682525845000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1386505603000315"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,7]]},"references-count":14,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2003,7]]}},"alternative-id":["S1386505603000315"],"URL":"https:\/\/doi.org\/10.1016\/s1386-5056(03)00031-5","relation":{},"ISSN":["1386-5056"],"issn-type":[{"value":"1386-5056","type":"print"}],"subject":[],"published":{"date-parts":[[2003,7]]}}}