Modelling and verifying dynamic access control policies in workflow-based healthcare systems
Access control system is an important component to protect patients’ information from abuse in a health care system. It is a major concern in the management, design, and development of healthcare systems. Designing access control policies for healthcare systems is complicated due to the dynamic and...
| Main Author: | Faruqui, Rokan Uddin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit Universiti Kebangsaan Malaysia
2020
|
| Online Access: | http://journalarticle.ukm.my/14836/ http://journalarticle.ukm.my/14836/1/01.pdf |
Similar Items
Security policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2010)
by: Teo, Poh Kuang, et al.
Published: (2010)
Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2011)
by: Teo, Poh Kuang, et al.
Published: (2011)
Services Monitoring Model for Dynamic Workflow Changes
by: Pudhota, Leo, et al.
Published: (2005)
by: Pudhota, Leo, et al.
Published: (2005)
Verifying systems of resource-bounded agents
by: Alechina, Natasha, et al.
Published: (2016)
by: Alechina, Natasha, et al.
Published: (2016)
Collaborative workflow modelling based on activity diagrams, coloured petri-nets and system dynamics
by: Pudhota, Leo
Published: (2012)
by: Pudhota, Leo
Published: (2012)
Verifying the authenticity of digital certificates
by: Kamel Ariffin, Muhammad Rezal
Published: (2021)
by: Kamel Ariffin, Muhammad Rezal
Published: (2021)
Service oriented model driven architecture for dynamic workflow changes
by: Pudhota, Leo, et al.
Published: (2005)
by: Pudhota, Leo, et al.
Published: (2005)
A secure, anonymous and verifiable E-Voting system
by: Ooi, Elynn
Published: (2020)
by: Ooi, Elynn
Published: (2020)
Management of dynamic and adaptive workflow business processes
by: Pudhota, Leo, et al.
Published: (2006)
by: Pudhota, Leo, et al.
Published: (2006)
Verifying requirements for resource-bounded agents
by: Abdur, Rakib
Published: (2011)
by: Abdur, Rakib
Published: (2011)
UPM perkenal aplikasi certificate verifier
by: Utusan Malaysia
Published: (2017)
by: Utusan Malaysia
Published: (2017)
Verifying heterogeneous multi-agent programs
by: Doan, Thu Trang, et al.
Published: (2014)
by: Doan, Thu Trang, et al.
Published: (2014)
To verify or not to verify: using partial least squares to predict effect of online news on panic buying during pandemic
by: Tan, Kim Lim, et al.
Published: (2022)
by: Tan, Kim Lim, et al.
Published: (2022)
A framework for relating, implementing and verifying argumentation models and their translations
by: van Gijzel, Bas
Published: (2016)
by: van Gijzel, Bas
Published: (2016)
Verifying the correctness of UML statechart outpatient clinic based on common modeling language and SMV
by: Abdul Samat, Pathiah, et al.
Published: (2021)
by: Abdul Samat, Pathiah, et al.
Published: (2021)
Efficiency three ways: tested, verified, and formalised
by: Handley, Martin AT
Published: (2020)
by: Handley, Martin AT
Published: (2020)
Essays on strategic naivety and disclosure of verifiable information
by: Sheth, Jesal Dilip
Published: (2019)
by: Sheth, Jesal Dilip
Published: (2019)
A model for characterizing knowledge utilization in verifying successful knowledge transfer
by: Abdullah, Salfarina, et al.
Published: (2018)
by: Abdullah, Salfarina, et al.
Published: (2018)
The virtual source method - verifying the concept using numerical and physical modelling
by: Saul, Matthew, et al.
Published: (2007)
by: Saul, Matthew, et al.
Published: (2007)
Rapid DNA-based analytical techniques to verify the authenticity of Halal food
by: Mustafa, Shuhaimi, et al.
Published: (2022)
by: Mustafa, Shuhaimi, et al.
Published: (2022)
Model for the evaluation of usability of scientific workflows
by: Amelia, Abd Rahman
Published: (2019)
by: Amelia, Abd Rahman
Published: (2019)
Workflow Management System For Networked Device
by: Ngeow , Yen Churn
Published: (2009)
by: Ngeow , Yen Churn
Published: (2009)
Compiling concurrency correctly: verifying software transactional memory
by: Hu, Liyang
Published: (2013)
by: Hu, Liyang
Published: (2013)
The necessity of laboratory analyses to verify the authenticity of halal products
by: Mustafa, Shuhaimi
Published: (2014)
by: Mustafa, Shuhaimi
Published: (2014)
Verifying existence of resource-bounded coalition uniform strategies
by: Alechina, Natasha, et al.
Published: (2016)
by: Alechina, Natasha, et al.
Published: (2016)
Dynamic user-defined access control policies via programming language / Suzana Ahmad
by: Ahmad, Suzana
Published: (2018)
by: Ahmad, Suzana
Published: (2018)
An Evaluation Of Healthcare Expenditure Policies And Development Of A University-Based Sustainable Healthcare Financing Model
by: Al-Shami, Abdulkareem Mohammed Ahmed
Published: (2017)
by: Al-Shami, Abdulkareem Mohammed Ahmed
Published: (2017)
Coloured petrinet for flexible business workflow modelling
by: Pudhota, Leo, et al.
Published: (2005)
by: Pudhota, Leo, et al.
Published: (2005)
Workflow in collaborative learning
by: Abdullah, Rusli
Published: (2000)
by: Abdullah, Rusli
Published: (2000)
Workflow system for MapReduce in cloud environment
by: Wadi, Muntadher Saadoon
Published: (2017)
by: Wadi, Muntadher Saadoon
Published: (2017)
Towards a formally verified functional quantum programming language
by: Green, Alexander S.
Published: (2010)
by: Green, Alexander S.
Published: (2010)
In situ target strength estimates of visually verified orange roughy
by: Macaulay, G., et al.
Published: (2013)
by: Macaulay, G., et al.
Published: (2013)
Web-based device workflow management engine
by: Ngeow, Y. C., et al.
Published: (2007)
by: Ngeow, Y. C., et al.
Published: (2007)
Push-based XML access control policy languages: a review
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014)
A case study of health information system workflow on mitigating opioid drug abuse in Saudi Arabia's healthcare system / Alogaili Fahad Abdulrahman
by: Alogaili, Fahad Abdulrahman
Published: (2021)
by: Alogaili, Fahad Abdulrahman
Published: (2021)
Deadline guarantee for scientific workflow using dynamic scheduling algorithms on IaaS clouds
by: Alqaisy, Sarah Abdulrahman Shukur
Published: (2018)
by: Alqaisy, Sarah Abdulrahman Shukur
Published: (2018)
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009)
by: Safdar, S., et al.
Published: (2009)
Student Workflow for Thesis Submission
by: Universiti Malaysia Sarawak, Centre for Graduate Studies
Published: (2016)
by: Universiti Malaysia Sarawak, Centre for Graduate Studies
Published: (2016)
Services management in component based collaborative workflow processes
by: Pudhota, Leo, et al.
Published: (2006)
by: Pudhota, Leo, et al.
Published: (2006)
Service agents based collaborative workflow management implementation
by: Pudhota, Leo, et al.
Published: (2005)
by: Pudhota, Leo, et al.
Published: (2005)
Similar Items
-
Security policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2010) -
Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2011) -
Services Monitoring Model for Dynamic Workflow Changes
by: Pudhota, Leo, et al.
Published: (2005) -
Verifying systems of resource-bounded agents
by: Alechina, Natasha, et al.
Published: (2016) -
Collaborative workflow modelling based on activity diagrams, coloured petri-nets and system dynamics
by: Pudhota, Leo
Published: (2012)