{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T22:12:49Z","timestamp":1770070369265,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/cbms.2013.6627814","type":"proceedings-article","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T17:49:25Z","timestamp":1382032165000},"page":"349-354","source":"Crossref","is-referenced-by-count":22,"title":["A secure RBAC mobile agent access control model for healthcare institutions"],"prefix":"10.1109","author":[{"given":"Catia","family":"Santos-Pereira","sequence":"first","affiliation":[]},{"given":"Alexandre B.","family":"Augusto","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Cruz-Correia","sequence":"additional","affiliation":[]},{"given":"Manuel E.","family":"Correia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.12"},{"key":"17","volume":"3881","year":"2004","journal-title":"Security Audit and Access Accountability Message XML Data Definitions for Healthcare Applications"},{"key":"18","year":"2009","journal-title":"Health Informatics-electronic Health Record Communication"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1102486.1102492"},{"key":"16","author":"schneier","year":"1995","journal-title":"Applied Cryptography Protocols Algorithms and Source Code"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"key":"14","first-page":"65","article-title":"Access control how can it improve patients' healthcare?","volume":"127","author":"ferreira","year":"2007","journal-title":"Stud Health Technol Inform"},{"key":"11","author":"analitics","year":"2012","journal-title":"Security of Patient Data"},{"key":"12","year":"2006","journal-title":"Health Informatics - Privilege Management and Access Control"},{"key":"3","first-page":"191","article-title":"Integration of hospital data using agent technologies-A case study","volume":"18","author":"cruz-correia","year":"2005","journal-title":"AI communications"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(00)00112-X"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2006.120"},{"key":"10","year":"2012","journal-title":"HIMSS"},{"key":"7","author":"jansen","year":"2000","journal-title":"NIST Special Publication 800-19 - Mobile Agent Security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9857-8"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-010-9595-8"},{"key":"4","author":"martins","year":"0","journal-title":"A Literature Review of Security Mechanisms Employed by Mobile Agents"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1049\/ecej:20020504"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2007.09.001"}],"event":{"name":"2013 IEEE 26th International Symposium on Computer-Based Medical Systems (CBMS)","location":"Porto, Portugal","start":{"date-parts":[[2013,6,20]]},"end":{"date-parts":[[2013,6,22]]}},"container-title":["Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6607262\/6627745\/06627814.pdf?arnumber=6627814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T23:52:56Z","timestamp":1490226776000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6627814\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/cbms.2013.6627814","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}