{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T16:04:15Z","timestamp":1768320255132,"version":"3.49.0"},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1109\/ccst.2008.4751275","type":"proceedings-article","created":{"date-parts":[[2009,1,20]],"date-time":"2009-01-20T15:02:38Z","timestamp":1232463758000},"page":"47-50","source":"Crossref","is-referenced-by-count":5,"title":["Improving the implementation of access control in EMR"],"prefix":"10.1109","author":[{"given":"Ana","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Cruz-Correia","sequence":"additional","affiliation":[]},{"given":"David","family":"Chadwick","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Antunes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","year":"0"},{"key":"2","first-page":"191","article-title":"integration of hospital data using agent technologies - a case study","volume":"18","author":"cruz-correia","year":"2005","journal-title":"AICommunications special issue of ECAI"},{"key":"1","author":"waegemann","year":"2003","journal-title":"Healthcare Informatics online 2003"},{"key":"7","author":"anderson","year":"2001","journal-title":"Security Engineering A Guide to Building Dependable Distributed Systems"},{"key":"6","article-title":"iso 7498-2 - information processing systems, open systems interconnection, basic reference model","year":"1989","journal-title":"Security Architecture"},{"key":"5","first-page":"139","author":"becker","year":"2004","journal-title":"Cassandra Flexible trust management applied to electronic health records"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.23.2.116"}],"event":{"name":"2008 IEEE International Carnahan Conference on Security Technology (ICCST)","location":"Prague, Czech Rebulic","start":{"date-parts":[[2008,10,13]]},"end":{"date-parts":[[2008,10,16]]}},"container-title":["2008 42nd Annual IEEE International Carnahan Conference on Security Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4747413\/4751258\/04751275.pdf?arnumber=4751275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:30:41Z","timestamp":1489764641000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4751275\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/ccst.2008.4751275","relation":{},"subject":[],"published":{"date-parts":[[2008,10]]}}}