{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:26:05Z","timestamp":1757456765390,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1145\/1940941.1940960","type":"proceedings-article","created":{"date-parts":[[2011,2,8]],"date-time":"2011-02-08T13:21:09Z","timestamp":1297171269000},"page":"66-79","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Cryptography based access control in healthcare web systems"],"prefix":"10.1145","author":[{"given":"Wasim A.","family":"Al-Hamdani","sequence":"first","affiliation":[{"name":"Kentucky State University, East Main, KY"}]}],"member":"320","published-online":{"date-parts":[[2010,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Tan J. (Ed.) 2005 E-healthcare information systems: An introduction for students and professionals. Hoboken NJ: Jossey-Bass is part of Wiely.   Tan J. (Ed.) 2005 E-healthcare information systems: An introduction for students and professionals. Hoboken NJ: Jossey-Bass is part of Wiely."},{"key":"e_1_3_2_1_2_1","unstructured":"Xukai Z. Dai Y.-S. &amp; Pan Y. 2008. Trust and security in collaborative computing. Hackensack NJ: World Scientific Publishing.   Xukai Z. Dai Y.-S. &amp; Pan Y. 2008. Trust and security in collaborative computing. Hackensack NJ: World Scientific Publishing."},{"key":"e_1_3_2_1_3_1","unstructured":"Beaver K. &amp; Herold R. 2004. The practical guide to HIPAA privacy and security compliance. City ST: Auerbach Publications A CRC Press Company.  Beaver K. &amp; Herold R. 2004. The practical guide to HIPAA privacy and security compliance. City ST: Auerbach Publications A CRC Press Company."},{"volume-title":"Retrieved","year":"2005","author":"Nsa","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"Apshankar K. 2009. Web Services Solution for HIPAA Compliance Using J2EE-based Web Services. Retrieved from webservicesarchitect.com\/: http:\/\/www.webservicesarchitect.com\/  Apshankar K. 2009. Web Services Solution for HIPAA Compliance Using J2EE-based Web Services. Retrieved from webservicesarchitect.com\/: http:\/\/www.webservicesarchitect.com\/"},{"key":"e_1_3_2_1_6_1","unstructured":"PublicLaw104-191. 1996. Health Insurance Portability And Accountability Act Of 1996.  PublicLaw104-191. 1996. Health Insurance Portability And Accountability Act Of 1996."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Cheng v. n. &amp; Hung P. c. 2008. An overview of the HIPAA-compliant privacy access control model. In J. Tan Healthcare information systems and informatics research and practices. ershey PA: Information Science Publishing (an imprint of IGI Global).  Cheng v. n. &amp; Hung P. c. 2008. An overview of the HIPAA-compliant privacy access control model. In J. Tan Healthcare information systems and informatics research and practices. ershey PA: Information Science Publishing (an imprint of IGI Global).","DOI":"10.4018\/978-1-59904-690-7.ch003"},{"key":"e_1_3_2_1_8_1","unstructured":"Laroia A. 2009. Leveraging Web services to connect the healthcare enterprise. Available online from http:\/\/www.ebizq.net\/topics\/Web_services\/features\/1546.html?page=5  Laroia A. 2009. Leveraging Web services to connect the healthcare enterprise. Available online from http:\/\/www.ebizq.net\/topics\/Web_services\/features\/1546.html?page=5"},{"volume-title":"Retrieved","year":"2009","author":"Zou X.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Ferraiolo D. F. Kuhn D. R. &amp; Chandramouli R. 2007. Role-based access control (2<sup>nd<\/sup> ed.). Norwood MA 02062 USA: Artech House.   Ferraiolo D. F. Kuhn D. R. &amp; Chandramouli R. 2007. Role-based access control (2<sup>nd<\/sup> ed.). Norwood MA 02062 USA: Artech House."},{"volume-title":"Retrieved","year":"2009","author":"Magazine","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"Kayem A. V. 2008. Adaptive cryptography access control for dynamic data sharing environments Ph.D. Thesis. Queen's University Canada.   Kayem A. V. 2008. Adaptive cryptography access control for dynamic data sharing environments Ph.D. Thesis. Queen's University Canada."},{"key":"e_1_3_2_1_14_1","first-page":"122","volume-title":"Chapter XI: Cryptography for Information Security. In G. N. Jatinder, &amp","author":"Al","year":"2009"},{"key":"e_1_3_2_1_15_1","unstructured":"Federal Information. 2001. Announcing the advanced encryption standard (AES). Processing Standards Publication 197. NIST.  Federal Information. 2001. Announcing the advanced encryption standard (AES). Processing Standards Publication 197. NIST."},{"volume-title":"Retrieved","year":"2008","key":"e_1_3_2_1_16_1"},{"volume-title":"Retrieved","year":"2007","key":"e_1_3_2_1_17_1"},{"volume-title":"Retrieved","year":"2008","author":"SearchSecurity","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2008.4737164"},{"volume-title":"Retrieved","year":"2005","author":"Nsa","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507730"},{"key":"e_1_3_2_1_22_1","unstructured":"Hu J. &amp; Weaver A. C. 2004. Dynamic context-aware access control for distributed healthcare applications. Available online from http:\/\/www.cs.virginia.edu\/papers\/p1-hu-dynamic.pdf  Hu J. &amp; Weaver A. C. 2004. Dynamic context-aware access control for distributed healthcare applications. Available online from http:\/\/www.cs.virginia.edu\/papers\/p1-hu-dynamic.pdf"},{"key":"e_1_3_2_1_23_1","unstructured":"Jih W-r. Cheng S-y. Jane Y-j. H. &amp; Tsai T.-M. 2008. Context-aware access control in pervasive healthcare. Available online from http:\/\/agents.\/~jih\/publication\/mam05.pdf  Jih W-r. Cheng S-y. Jane Y-j. H. &amp; Tsai T.-M. 2008. Context-aware access control in pervasive healthcare. Available online from http:\/\/agents.\/~jih\/publication\/mam05.pdf"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69916-3_6"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2008.14"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Georgiadis C. K. Mavridis I. K. &amp; Pangalos G. I. 2002 Programming a view-based active access-control system for healthcare environments. Health Informatics Journal 8(4). PP: 191--198.  Georgiadis C. K. Mavridis I. K. &amp; Pangalos G. I. 2002 Programming a view-based active access-control system for healthcare environments. Health Informatics Journal 8 (4). PP: 191--198.","DOI":"10.1177\/146045820200800405"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232473"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542228"},{"key":"e_1_3_2_1_29_1","unstructured":"R\u00f8stad L. 2008. Access control in healthcare information systems.: Norwegian University of Science and Technology.  R\u00f8stad L. 2008. Access control in healthcare information systems.: Norwegian University of Science and Technology."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314466.1314477"},{"volume-title":"CISSP: Certified information systems security professional (3<sup>rd<\/sup> ed.).","year":"2005","author":"Stewart J. M.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775432"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Kohl J. &amp; Neuman C. 1993. The Kerberos network authentication service (V5). Request for Comments: 1510.  Kohl J. &amp; Neuman C. 1993. The Kerberos network authentication service (V5). Request for Comments: 1510.","DOI":"10.17487\/rfc1510"},{"key":"e_1_3_2_1_34_1","unstructured":"ISO. 1993. Open systems interconnection---The directory: Authentication framework. Number X.509 in ITU--T. Authentication framework. Number X.509 in ITU--T 1993. Authentication framework. Number X.509 in ITU--T.  ISO. 1993. Open systems interconnection---The directory: Authentication framework. Number X.509 in ITU--T. Authentication framework. Number X.509 in ITU--T 1993. Authentication framework. Number X.509 in ITU--T."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357402"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/146941.146943"},{"key":"e_1_3_2_1_37_1","unstructured":"Thyregod S. 2006. Key management in cryptography access control. M.Sc. thesis from Technical University of Denmark.  Thyregod S. 2006. Key management in cryptography access control. M.Sc. thesis from Technical University of Denmark."},{"key":"e_1_3_2_1_38_1","unstructured":"Harrington A. 2001. Cryptography access control for a network file system. Master's thesis Trinity College Dublin.  Harrington A. 2001. Cryptography access control for a network file system. Master's thesis Trinity College Dublin."},{"key":"e_1_3_2_1_39_1","unstructured":"IEEE. 2009. IEEE P1619.3#8482;\/D6 draft standard for key management infrastructure for cryptography protection of stored data.  IEEE. 2009. IEEE P1619.3#8482;\/D6 draft standard for key management infrastructure for cryptography protection of stored data."},{"key":"e_1_3_2_1_40_1","unstructured":"Kayem A. V. 2008. Adaptive cryptography access control for dynamic data sharing environments Ph.D. Thesis. Queen's University Canada.   Kayem A. V. 2008. Adaptive cryptography access control for dynamic data sharing environments Ph.D. Thesis. Queen's University Canada."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.12.011"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.1006"},{"volume-title":"Retrieved","year":"2004","author":"Chothia T.","key":"e_1_3_2_1_43_1"},{"key":"e_1_3_2_1_44_1","unstructured":"Dacs.dss.ca. (2009). Distributed system software. Retrieved June 1 2009 from http:\/\/dacs.dss.ca\/exec-overview.html  Dacs.dss.ca. (2009). Distributed system software. Retrieved June 1 2009 from http:\/\/dacs.dss.ca\/exec-overview.html"},{"key":"e_1_3_2_1_45_1","unstructured":"Idmanagement.gov. (2009). Federal public key infrastructure. Available online from http:\/\/www.idmanagement.gov\/fpkisc\/drilldown_sc.cfm?action=hcwg  Idmanagement.gov. (2009). Federal public key infrastructure. Available online from http:\/\/www.idmanagement.gov\/fpkisc\/drilldown_sc.cfm?action=hcwg"},{"key":"e_1_3_2_1_46_1","unstructured":"Raina K. (2003). PKI security solutions for the enterprise: Solving HIPAA E-Paper Act and other compliance issues. Danvers MA 01923: Wiley Publishing.   Raina K. (2003). PKI security solutions for the enterprise: Solving HIPAA E-Paper Act and other compliance issues. Danvers MA 01923: Wiley Publishing."}],"event":{"name":"InfoSecCD '10: 2010 Information Security Curriculum Development Conference","sponsor":["KSU - CISE KSU Center for InfoSec Education","ISSA The Metro Atlanta Information Systems Security Association","SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw Georgia","acronym":"InfoSecCD '10"},"container-title":["2010 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940960","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1940941.1940960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:50Z","timestamp":1750249070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940960"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":45,"alternative-id":["10.1145\/1940941.1940960","10.1145\/1940941"],"URL":"https:\/\/doi.org\/10.1145\/1940941.1940960","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]},"assertion":[{"value":"2010-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}