{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T21:19:11Z","timestamp":1776979151790,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1145\/3723178.3723201","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:16:47Z","timestamp":1749194207000},"page":"169-176","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["AI and RBAC Enhanced Security System for Hospitals in Bangladesh"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-0166-0561","authenticated-orcid":false,"given":"Shaikh Navid","family":"Ahmed","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, United International University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9348-7690","authenticated-orcid":false,"given":"Md. Sajedul Islam","family":"Sajib","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, United International University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5856-3117","authenticated-orcid":false,"given":"Naim","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, United International University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9872-1029","authenticated-orcid":false,"given":"Umme Sumaya","family":"Ali","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, United International University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0741-1341","authenticated-orcid":false,"given":"Laila Tuz Joha","family":"Fariha","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, United International University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1857-8567","authenticated-orcid":false,"given":"Amina","family":"Afroz","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, United International University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3183-6420","authenticated-orcid":false,"given":"Mir Moynuddin Ahmed","family":"Shibly","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, United International University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3590-1500","authenticated-orcid":false,"given":"Mohammad Shamim","family":"Ahsan","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, United International University, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","unstructured":"Majid Afshar Saeed Samet and Ting Hu. 2018. An Attribute Based Access Control Framework for Healthcare System. Journal of Physics: Conference Series 933 (01 2018) 012020. 10.1088\/1742-6596\/933\/1\/012020","DOI":"10.1088\/1742-6596\/933\/1\/012020"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Ahmed\u00a0Abdelmoamen Ahmed and Mathias Echi. 2021. Hawk-Eye: An AI-Powered Threat Detector for Intelligent Surveillance Cameras. IEEE Access 9 (2021) 63283\u201363293. 10.1109\/ACCESS.2021.3074319","DOI":"10.1109\/ACCESS.2021.3074319"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"Abbas\u00a0M. Al-Ghaili Saraswathy\u00a0Shamini Gunasekaran Norziana Jamil Zaid Abdi\u00a0Alkareem Alyasseri Naif\u00a0Mohammed Al-Hada Zul-Azri\u00a0Bin Ibrahim Asmidar\u00a0Abu Bakar Hairoladenan Kasim Eghbal Hosseini Ridha Omar Rafiziana\u00a0Md. Kasmani and Rina\u00a0Azlin Razali. 2023. A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications. IEEE Access 11 (2023) 101924\u2013101948. 10.1109\/ACCESS.2023.3312682","DOI":"10.1109\/ACCESS.2023.3312682"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPET.2019.00024"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMIA48430.2020.9074920"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPC51351.2021.9451739"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE49692.2020.00043"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","unstructured":"Carlo Blundo Stelvio Cimato and Luisa Siniscalchi. 2020. Managing Constraints in Role Based Access Control. IEEE Access 8 (2020) 140497\u2013140511. 10.1109\/ACCESS.2020.3011310","DOI":"10.1109\/ACCESS.2020.3011310"},{"key":"e_1_3_3_1_10_2","unstructured":"Edwin\u00a0Okoampa Boadu and Gabriel\u00a0Kofi Armah. 2014. Role-based access control (RBAC) based in hospital management. Int. J. Softw. Eng. Knowl. Eng 3 (2014) 53\u201367."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","unstructured":"Baozhan Chen Siyuan Qiao Jie Zhao Dongqing Liu Xiaobing Shi Minzhao Lyu Haotian Chen Huimin Lu and Yunkai Zhai. 2021. A Security Awareness and Protection System for 5G Smart Healthcare Based on Zero-Trust Architecture. IEEE Internet of Things Journal 8 13 (2021) 10248\u201310263. 10.1109\/JIOT.2020.3041042","DOI":"10.1109\/JIOT.2020.3041042"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS59211.2023.00046"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2014.7021054"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2014.7021054"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Ernest\u00a0L Hall Richard\u00a0P Kruger Samuel\u00a0J Dwyer David\u00a0L Hall Robert\u00a0W McLaren and Gwilyu\u00a0S Lodwick. 1971. A survey of preprocessing and feature extraction techniques for radiographic images. IEEE Trans. Comput. 100 9 (1971) 1032\u20131044.","DOI":"10.1109\/T-C.1971.223399"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","unstructured":"Ratnawati Ibrahim and Zalhan Mohd\u00a0Zin. 2011. Study of automated face recognition system for office door access control application. (05 2011). 10.1109\/ICCSN.2011.6014865","DOI":"10.1109\/ICCSN.2011.6014865"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","unstructured":"Shahidul Khan and Abu Latiful\u00a0Haque. 2015. Development of national health data warehouse Bangladesh: Privacy issues and a practical solution. 373\u2013378. 10.1109\/ICCITechn.2015.7488099","DOI":"10.1109\/ICCITechn.2015.7488099"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Soumya\u00a0Suvra Khan Diganta Sengupta Anupam Ghosh and Atal Chaudhuri. 2024. MTCNN++: A CNN-based face detection algorithm inspired by MTCNN. The Visual Computer 40 2 (2024) 899\u2013917.","DOI":"10.1007\/s00371-023-02822-0"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","unstructured":"Sang Lee Siddharth Sharma Linlin Sang Jong-Il Park and Yong Park. 2011. An Intelligent Video Security System Using Object Tracking and Shape Recognition. 471\u2013482. 10.1007\/978-3-642-23687-743","DOI":"10.1007\/978-3-642-23687-743"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/SIN56466.2022.9970498"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.74"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSEC58147.2023.10276231"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","unstructured":"Ganthan Narayana\u00a0Samy Rabiah Ahmad and Zuraini Ismail. 2010. Security threats categories in healthcare information systems. Health informatics journal 16 (09 2010) 201\u20139. 10.1177\/1460458210377468","DOI":"10.1177\/1460458210377468"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","unstructured":"Mohammad Noorizadeh Mohammad Shakerpour Nader Meskin Devrim Unal and Khashayar Khorasani. 2021. A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed. IEEE Access 9 (2021) 16239\u201316253. 10.1109\/ACCESS.2021.3053135","DOI":"10.1109\/ACCESS.2021.3053135"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","unstructured":"K Padmavathi and K Thangadurai. 2016. Implementation of RGB and grayscale images in plant leaves disease detection\u2013comparative study. Indian Journal of Science and Technology 9 6 (2016) 1\u20136.","DOI":"10.17485\/ijst\/2016\/v9i6\/77739"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","unstructured":"Deepak Puthal Surya Nepal Rajiv Ranjan and Jinjun Chen. 2016. Threats to Networking Cloud and Edge Datacenters in the Internet of Things. IEEE Cloud Computing 3 3 (2016) 64\u201371. 10.1109\/MCC.2016.63","DOI":"10.1109\/MCC.2016.63"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/iCMLDE.2018.00013"},{"key":"e_1_3_3_1_28_2","unstructured":"A Suganthy and V\u00a0Prasanna Venkatesan. [n. d.]. ROLE-CENTRIC RBAC MODELS\u2013A LITERATURE REVIEW. ([n. d.])."},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"crossref","unstructured":"A Ubale\u00a0Swapnaja G Modani\u00a0Dattatray and S Apte\u00a0Sulabha. 2014. Analysis of dac mac rbac access control based models for security. International Journal of Computer Applications 104 5 (2014) 6\u201313.","DOI":"10.5120\/18196-9115"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Waseem Ullah Amin Ullah Tanveer Hussain Khan Muhammad Ali\u00a0Asghar Heidari Javier Del\u00a0Ser Sung\u00a0Wook Baik and Victor Hugo\u00a0C De\u00a0Albuquerque. 2022. Artificial Intelligence of Things-assisted two-stream neural network for anomaly detection in surveillance Big Video Data. Future Generation Computer Systems 129 (2022) 286\u2013297.","DOI":"10.1016\/j.future.2021.10.033"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","unstructured":"Zhiguo Wan Robert\u00a0H Deng et\u00a0al. 2011. HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE transactions on information forensics and security 7 2 (2011) 743\u2013754.","DOI":"10.1109\/TIFS.2011.2172209"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2009.5276928"}],"event":{"name":"ICCA 2024: 3rd International Conference on Computing Advancements","location":"Dhaka Bangladesh","acronym":"ICCA 2024"},"container-title":["Proceedings of the 3rd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723201","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723178.3723201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:46Z","timestamp":1750298206000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723201"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":31,"alternative-id":["10.1145\/3723178.3723201","10.1145\/3723178"],"URL":"https:\/\/doi.org\/10.1145\/3723178.3723201","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"2025-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}