{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T23:00:44Z","timestamp":1768345244439,"version":"3.49.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/bhi.2014.6864421","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T21:09:32Z","timestamp":1406754572000},"page":"539-542","source":"Crossref","is-referenced-by-count":8,"title":["Standardized access control mechanisms for protecting ISO 13606-based electronic health record systems"],"prefix":"10.1109","author":[{"given":"Jorge","family":"Calvillo-Arbizu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Isabel","family":"Roman-Martinez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Laura M.","family":"Roa-Romero","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"17","author":"horrocks","year":"2004","journal-title":"SWRL A Semantic Web Rule Language Combining OWL and RuleML"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2013.6627838"},{"key":"15","year":"2008"},{"key":"16","year":"2006"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1111\/joim.12119"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2012.12.003"},{"key":"11","year":"2013","journal-title":"ISO 14441-Health Informatics-Security and Privacy Requirements of EHR Systems for Use in Conformity Assessment"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03354-4_25"},{"key":"3","first-page":"554","article-title":"Role-based access control","author":"ferraiolo","year":"1992","journal-title":"Proceedings of the NIST-NSA National (USA) Computer Security Conference"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2008.06.013"},{"key":"1","year":"2008"},{"key":"10","year":"2009","journal-title":"Electronic Health Record-System Functional Model Release 1 1"},{"key":"7","year":"2009"},{"key":"6","author":"cantor","year":"2005","journal-title":"Assertions and Protocols for the Oasis Security Assertion Markup Language (SAML) V2 0"},{"key":"5","year":"0"},{"key":"4","article-title":"From ABAC to ZBAC: The evolution of access control models","author":"karp","year":"2009","journal-title":"HP Labs Technical Report"},{"key":"9","year":"0"},{"key":"8","year":"2009"}],"event":{"name":"2014 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI)","location":"Valencia, Spain","start":{"date-parts":[[2014,6,1]]},"end":{"date-parts":[[2014,6,4]]}},"container-title":["IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6853543\/6864286\/06864421.pdf?arnumber=6864421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T20:24:59Z","timestamp":1490300699000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6864421\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/bhi.2014.6864421","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}