{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:26:29Z","timestamp":1758270389419,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/cbms.2011.5999035","type":"proceedings-article","created":{"date-parts":[[2011,8,31]],"date-time":"2011-08-31T15:20:36Z","timestamp":1314804036000},"page":"1-6","source":"Crossref","is-referenced-by-count":12,"title":["Usable access control policy and model for healthcare"],"prefix":"10.1109","author":[{"given":"Ana","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Correia","sequence":"additional","affiliation":[]},{"given":"Marta","family":"Brito","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Antunes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.267"},{"key":"13","article-title":"How to securely break into RBAC: The BTG-RBAC model","author":"ferreira","year":"0","journal-title":"25th Annual Computer Security Applications Conference - ACSAC 2009"},{"journal-title":"Information Technology - Role Based Access Control","year":"2004","key":"14"},{"journal-title":"ISO\/TS 22600 - Health Informatics - Privilege Management and Access Control","year":"2006","key":"11"},{"journal-title":"Role-Based Access Control","year":"2007","author":"ferraiolo","key":"12"},{"key":"3","first-page":"139","author":"becker","year":"2004","journal-title":"Cassandra Flexible Trustmanagement Applied to Electronic Health Records"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.23.2.116"},{"key":"1","first-page":"1","article-title":"Electronic health records: How close? How far to go?","author":"sprague","year":"2004","journal-title":"NHPF Issue Brief"},{"journal-title":"Constructing grounded theory A practical guide through qualitative analysis","year":"2006","author":"charmaz","key":"10"},{"key":"7","first-page":"65","article-title":"Access Control: How can it improve patients' healthcare?","volume":"127","author":"ferreira","year":"2007","journal-title":"Stud Health Technol Inform"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0149-7189(99)00034-8"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1177\/016224399101600304"},{"journal-title":"CISSP All-in-One Exam Guide","year":"2003","author":"harris","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511557842"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2010.01.009"}],"event":{"name":"2011 24th International Symposium on Computer-Based Medical Systems (CBMS)","start":{"date-parts":[[2011,6,27]]},"location":"Bristol, United Kingdom","end":{"date-parts":[[2011,6,30]]}},"container-title":["2011 24th International Symposium on Computer-Based Medical Systems (CBMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5983498\/5999016\/05999035.pdf?arnumber=5999035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T06:32:06Z","timestamp":1490077926000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5999035\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cbms.2011.5999035","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}