{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:51:55Z","timestamp":1774021915521,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/ccnc.2011.5766466","type":"proceedings-article","created":{"date-parts":[[2011,5,13]],"date-time":"2011-05-13T14:16:45Z","timestamp":1305296205000},"page":"247-251","source":"Crossref","is-referenced-by-count":36,"title":["Ensuring access control in cloud provisioned healthcare systems"],"prefix":"10.1109","author":[{"given":"Hema Andal Jayaprakash","family":"Narayanan","sequence":"first","affiliation":[]},{"given":"Mehmet Hadi","family":"Gunes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs","author":"edsberg","year":"2006","journal-title":"Proc of 22nd Annual Computer Security Applications Conference"},{"key":"ref11","author":"robert","year":"2010","journal-title":"Cloud Computing A Practical Approach"},{"key":"ref12","first-page":"30","article-title":"Fundamentals of Worliflow Management Technology","author":"fan","year":"2001"},{"key":"ref13","article-title":"RTFW: An Access Control Model for Worliflow Environment","author":"jiang","year":"2006","journal-title":"Computer Supported Cooperative Work in Design 10th International Conference on"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","article-title":"Making a faster cryptanalytic time-memory trade-off","volume":"2729","author":"oechslin","year":"0","journal-title":"Advances in Cryptology - CRYPTO 2003"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(02)00029-7"},{"key":"ref16","article-title":"Security in Computing","author":"pfleger","year":"1997"},{"key":"ref17","article-title":"The MD5 Message-Digest Algorithm","author":"riverst","year":"1992","journal-title":"RFC 1321"},{"key":"ref18","article-title":"Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management","author":"sandhu","year":"1997","journal-title":"Proceedings of the IFIP WG11 3 Workshop on Database Security"},{"key":"ref19","first-page":"183","article-title":"Separation of duty in role-based environments","author":"zurko","year":"1997","journal-title":"Proceedings of the 10th IEEE Computer Security Foundations Workshop (CSFW '97)"},{"key":"ref4","article-title":"Meeting HITECH's Challenge to the Health Care Industry","year":"2010","journal-title":"An Oracle White Paper"},{"key":"ref3","article-title":"Healthcare SaaS Vs. Licensed Software","year":"2009","journal-title":"Healthcare Technology Online"},{"key":"ref6","first-page":"44","article-title":"An authorization model for worliflows","author":"atluri","year":"1996","journal-title":"proc of the ESORIC 1996 LNCS1146"},{"key":"ref5","article-title":"Ensuring Spatio-Temporal Access Control for Real-World Applications","author":"anastasakis","year":"2009","journal-title":"Proceedings of the 14th ACM Symposium on Access Control Models and Technologies"},{"key":"ref8","author":"botha","year":"2001","journal-title":"CoSAWoE &#x2013;A Model for Context-sensitive Access Control in Workflow Environments"},{"key":"ref7","article-title":"A Role based Access Control Model and Reference Implementation within a Corporate Intranet","author":"barkley","year":"1999","journal-title":"ACM Trans on Information and System Security"},{"key":"ref2","year":"0","journal-title":"Amazon EC2"},{"key":"ref1","year":"0"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-Based Access Control Models","volume":"29","author":"coyne","year":"1996","journal-title":"IEEE Computer"}],"event":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","location":"Las Vegas, NV, USA","start":{"date-parts":[[2011,1,9]]},"end":{"date-parts":[[2011,1,12]]}},"container-title":["2011 IEEE Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5762824\/5766312\/05766466.pdf?arnumber=5766466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T20:11:06Z","timestamp":1497903066000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5766466\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2011.5766466","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}