{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T05:20:03Z","timestamp":1761110403858},"reference-count":18,"publisher":"World Scientific Pub Co Pte Lt","issue":"06","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Soft. Eng. Knowl. Eng."],"published-print":{"date-parts":[[2018,6]]},"abstract":"<jats:p> Traditional discretionary access control (DAC) or mandatory access control (MAC) is not quite effective for remote environment. General role-based access control (RBAC) also has its limitations to control access for applications like remote healthcare due to its static nature. Design of effective access control model is indeed a big challenge for such applications. Fine-grained access control logic capable of adapting changes based on run-time information needs to be considered to meet the requirements of remote healthcare scenarios. In this work, an adaptive access control model is proposed keeping in compliance with state\u2013of-the-art scenario towards ensuring quality of context and trust relationship between owners and users. It focuses on inter-component relationship, where phases are executed either in online or in offline mode to avoid performance bottleneck. Adaptive binding is integrated with application specific workflows. Workflow net models for different scenarios of medical kiosk-based rural healthcare are analyzed to validate proposed access control logic at design time that can reduce the possibility of major faults at run time. Our proposed work supports formal analysis and verification using Workflow Petri Net Designer (WoPeD) tool. Comparative analysis shows how proposed access control model advances the state of art. <\/jats:p>","DOI":"10.1142\/s0218194018500225","type":"journal-article","created":{"date-parts":[[2018,6,13]],"date-time":"2018-06-13T09:01:31Z","timestamp":1528880491000},"page":"781-810","source":"Crossref","is-referenced-by-count":19,"title":["An Adaptation of Context and Trust Aware Workflow Oriented Access Control for Remote Healthcare"],"prefix":"10.1142","volume":"28","author":[{"given":"Tapalina","family":"Bhattasali","sequence":"first","affiliation":[{"name":"University of Calcutta, Kolkata, India"}]},{"given":"Rituparna","family":"Chaki","sequence":"additional","affiliation":[{"name":"University of Calcutta, Kolkata, India"}]},{"given":"Nabendu","family":"Chaki","sequence":"additional","affiliation":[{"name":"University of Calcutta, Kolkata, India"}]},{"given":"Khalid","family":"Saeed","sequence":"additional","affiliation":[{"name":"Bialystok University of Technology, Bialystok, Poland"}]}],"member":"219","published-online":{"date-parts":[[2018,6,13]]},"reference":[{"key":"S0218194018500225BIB004","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0506-5"},{"key":"S0218194018500225BIB006","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.05.015"},{"key":"S0218194018500225BIB007","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.155"},{"key":"S0218194018500225BIB008","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-012-7120-4"},{"key":"S0218194018500225BIB009","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.97"},{"issue":"3","key":"S0218194018500225BIB011","first-page":"1","volume":"3","author":"H-Ramos J. L.","year":"2013","journal-title":"J. Internet Services Inf. Sec"},{"key":"S0218194018500225BIB013","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888914000034"},{"key":"S0218194018500225BIB015","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.6.6.1096-1102"},{"key":"S0218194018500225BIB018","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.42"},{"key":"S0218194018500225BIB019","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2242751"},{"key":"S0218194018500225BIB022","first-page":"11","volume":"259","author":"Suhendra V.","year":"2011","journal-title":"Commun. Comput. Inf. Sci"},{"key":"S0218194018500225BIB024","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-015-1705-6"},{"key":"S0218194018500225BIB025","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-0980-1"},{"issue":"1","key":"S0218194018500225BIB026","first-page":"45","volume":"19","author":"Younis Y. A.","year":"2014","journal-title":"J. Inf. Secur. Appl"},{"key":"S0218194018500225BIB027","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2260072"},{"key":"S0218194018500225BIB030","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2365797"},{"key":"S0218194018500225BIB031","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.6827577"},{"key":"S0218194018500225BIB033","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2013.1193"}],"container-title":["International Journal of Software Engineering and Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218194018500225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T19:12:10Z","timestamp":1565118730000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218194018500225"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":18,"journal-issue":{"issue":"06","published-online":{"date-parts":[[2018,6,13]]},"published-print":{"date-parts":[[2018,6]]}},"alternative-id":["10.1142\/S0218194018500225"],"URL":"https:\/\/doi.org\/10.1142\/s0218194018500225","relation":{},"ISSN":["0218-1940","1793-6403"],"issn-type":[{"value":"0218-1940","type":"print"},{"value":"1793-6403","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6]]}}}