{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T02:27:25Z","timestamp":1772591245618,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,24]],"date-time":"2018-03-24T00:00:00Z","timestamp":1521849600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Institute of Standards and Technology","award":["60NANB16D250"],"award-info":[{"award-number":["60NANB16D250"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,24]]},"DOI":"10.1145\/3041048.3041055","type":"proceedings-article","created":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T10:54:21Z","timestamp":1490352861000},"page":"29-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Attribute Based Access Control for Healthcare Resources"],"prefix":"10.1145","author":[{"given":"Subhojeet","family":"Mukherjee","sequence":"first","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]},{"given":"Indrakshi","family":"Ray","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]},{"given":"Indrajit","family":"Ray","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]},{"given":"Hossein","family":"Shirazi","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]},{"given":"Toan","family":"Ong","sequence":"additional","affiliation":[{"name":"University of Colorado, Denver, Denver, CO, USA"}]},{"given":"Michael G.","family":"Kahn","sequence":"additional","affiliation":[{"name":"University of Colorado, Denver, Denver, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.95"},{"key":"e_1_3_2_1_2_1","volume-title":"Oct","author":"Apache Axis","year":"2016","unstructured":"Apache Axis2 - Apache Axis2 User's Guide- Introducing Axis2. https:\/\/axis.apache.org\/axis2\/java\/core\/docs\/userguide.html, Oct 2016. {Online; Accessed 24-January-2017}."},{"key":"e_1_3_2_1_3_1","volume-title":"IHE International","author":"Caumanns","year":"2009","unstructured":"Caumanns, J\u00f6rg and Kuhlisch, Raik and Pfaff, Oliver and Rode, Olaf. IHE IT-Infrastructure White Paper: Access Control. Tech. rep., IHE International, Sept 2009."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.389"},{"key":"e_1_3_2_1_5_1","volume-title":"Jan","author":"Xtensible Access Control Markup 0.","year":"2013","unstructured":"eXtensible Access Control Markup Language (XACML) Version 3.0. http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html, Jan 2013. {Online; Accessed 24-January-2017}."},{"key":"e_1_3_2_1_6_1","unstructured":"Final: OpenID Connect Core 1.0. http:\/\/openid.net\/specs\/openid-connect-core-1_0-final.html. {Online; Accessed 24-January-2017}."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 8th Australasian Workshop on Health Informatics and Knowledge Management (HIKM 2015)","author":"Grunwell D.","year":"2015","unstructured":"Grunwell, D., Gajanayake, R., and Sahama, T. The Security and Privacy of Usage Policies and Provenance Logs in an Information Accountability Framework. In Proceedings of the 8th Australasian Workshop on Health Informatics and Knowledge Management (HIKM 2015) (Sydney, Australia, 2015)."},{"key":"e_1_3_2_1_8_1","volume-title":"Internet Engineering Task Force","author":"Hardt D.","year":"2012","unstructured":"Hardt, D. The OAuth 2.0 Authorization Framework. Request for Comments 6749, Internet Engineering Task Force, Oct 2012."},{"key":"e_1_3_2_1_9_1","first-page":"589","volume-title":"Proceedings of a Workshop Presented to the National Cancer Policy Forum","author":"Herdman R.","year":"2006","unstructured":"Herdman, R., and Moses, H. Effect of the HIPAA Privacy Rule on Health Research. In Proceedings of a Workshop Presented to the National Cancer Policy Forum (2006), pp. 589--594."},{"key":"e_1_3_2_1_10_1","volume-title":"Internet Engineering Task Force","author":"Holz R.","year":"2015","unstructured":"Holz, R., Sheffer, Y., and Saint-Andre, P. Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS). Request for Comments 7457, Internet Engineering Task Force, Feb 2015."},{"key":"e_1_3_2_1_11_1","volume-title":"Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST Special Publication 800--162","author":"Hu V. C.","year":"2014","unstructured":"Hu, V. C., Ferraiolo, D., Kuhn, R., Friedman, A. R., Lang, A. J., Cogdell, M. M., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K., et al. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST Special Publication 800--162, National Institute of Standards and Technology, January 2014."},{"key":"e_1_3_2_1_12_1","first-page":"55","volume-title":"Proceedings of the 7th Central European Workshop on Services and their Composition","author":"H\u00fcffmeyer M.","year":"2015","unstructured":"H\u00fcffmeyer, M., and Schreier, U. Efficient Attribute Based Access Control for RESTful Services. In Proceedings of the 7th Central European Workshop on Services and their Composition (Jena, Germany, February 2015), pp. 55--62."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875491.2875494"},{"key":"e_1_3_2_1_14_1","volume-title":"Jan","author":"Jersey","year":"2017","unstructured":"Jersey. https:\/\/jersey.java.net\/, Jan 2017. {Online; Accessed 24-January-2017}."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobihealth.2014.257232"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2_6"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866855.1866865"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocv189"},{"key":"e_1_3_2_1_19_1","first-page":"1","volume-title":"Proceedings of eChallenges e-2013 Conference","author":"Namli T.","year":"2013","unstructured":"Namli, T., Postaci, S., Genct\u00fcrk, M., Doga\\c c, A., Yal\\c cinkaya, A., and Taskin, C. Addressing the Adoptability Challenges of the PHR Systems: SharingCare. In Proceedings of eChallenges e-2013 Conference (Dublin, Ireland, October 2013), pp. 1--6."},{"key":"e_1_3_2_1_20_1","first-page":"18","article-title":"Influence of the Hipaa Privacy Rule on Health Research","volume":"298","author":"Ness R. B.","year":"2007","unstructured":"Ness, R. B., Committee, J. P., and of Epidemiology f, S. Influence of the Hipaa Privacy Rule on Health Research. Journal of the American Medical Association 298, 18 (Nov 2007), 2164--2170.","journal-title":"Journal of the American Medical Association"},{"key":"e_1_3_2_1_21_1","volume-title":"Nov","author":"Organizations Interested in FHIR - HL7Wiki.","year":"2016","unstructured":"Organizations Interested in FHIR - HL7Wiki. http:\/\/wiki.hl7.org\/index.php?title=Organizations_interested_in_FHIR#List_of_Organizations_.28in_Alphabetical_Order.29, Nov 2016. {Online; Accessed 24-January-2017}."},{"key":"e_1_3_2_1_22_1","volume-title":"Oct","author":"Fast Healthcare Interoperability Resources 0.","year":"2015","unstructured":"Fast Healthcare Interoperability Resources Overview - FHIR v1.0.2. https:\/\/www.hl7.org\/fhir\/overview.html, Oct 2015. {Online; Accessed 24-January-2017}."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/BHI.2016.7455820"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2818"},{"key":"e_1_3_2_1_25_1","volume-title":"Oct","author":"Security 0.","year":"2015","unstructured":"Security - FHIR v1.0.2. https:\/\/www.hl7.org\/fhir\/security.html, Oct 2015. {Online; Accessed 24-January-2017}."},{"key":"e_1_3_2_1_26_1","volume-title":"Oct","author":"Security 0.","year":"2015","unstructured":"Security-labels - FHIR v1.0.2. https:\/\/www.hl7.org\/fhir\/security-labels.html, Oct 2015. {Online; Accessed 24-January-2017}."},{"key":"e_1_3_2_1_27_1","unstructured":"WSO2 Identity Server: WSO2 Identity & Access Management | WSO2 Inc. http:\/\/wso2.com\/products\/identity-server\/. {Online; Accessed 24-January-2017}."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.62"}],"event":{"name":"CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy","location":"Scottsdale Arizona USA","acronym":"CODASPY '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041048.3041055","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3041048.3041055","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3041048.3041055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:25:48Z","timestamp":1763457948000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041048.3041055"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,24]]},"references-count":28,"alternative-id":["10.1145\/3041048.3041055","10.1145\/3041048"],"URL":"https:\/\/doi.org\/10.1145\/3041048.3041055","relation":{},"subject":[],"published":{"date-parts":[[2017,3,24]]},"assertion":[{"value":"2017-03-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}