Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments
Recently research is focused on security policy integration and conflict reconciliation among various healthcare organizations. Problem statement: However, challenging security and privacy risk issues still arisen during sharing sensitive patient data in different large distributed organizations. Th...
| Main Authors: | Teo, Poh Kuang, Ibrahim, Hamidah, Udzir, Nur Izura, Sidi, Fatimah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Publications
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/22474/ http://psasir.upm.edu.my/id/eprint/22474/1/ajebasp.2011.101.111.pdf |
Similar Items
Security policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2010)
by: Teo, Poh Kuang, et al.
Published: (2010)
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment
by: Abu Bakar, Azreena, et al.
Published: (2011)
by: Abu Bakar, Azreena, et al.
Published: (2011)
Policy inconsistency detection based on RBAC model in cross-organizational collaboration
by: Teo, Poh Kuang, et al.
Published: (2011)
by: Teo, Poh Kuang, et al.
Published: (2011)
Modelling and verifying dynamic access control policies in workflow-based healthcare systems
by: Faruqui, Rokan Uddin
Published: (2020)
by: Faruqui, Rokan Uddin
Published: (2020)
Security policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2010)
by: Teo, Poh Kuang, et al.
Published: (2010)
Role performance trust-based access control for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2016)
by: Salji, Mohd Rafiz, et al.
Published: (2016)
Performance and divisional trust and purpose-based access control for privacy preservation
by: Salji, Mohd Rafiz, et al.
Published: (2018)
by: Salji, Mohd Rafiz, et al.
Published: (2018)
Trust, purpose, and role-based access control model for privacy protection
by: Salji, Mohd Rafiz, et al.
Published: (2019)
by: Salji, Mohd Rafiz, et al.
Published: (2019)
Blockchain-based access control scheme for secure shared personal health records over decentralised storage
by: Hussien, Hassan Mansur, et al.
Published: (2021)
by: Hussien, Hassan Mansur, et al.
Published: (2021)
Trust-based access control model with quantification method for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2022)
by: Salji, Mohd Rafiz, et al.
Published: (2022)
Secure role based access control systems using aspect-orientation designing
by: Hazaa, Muneer A., et al.
Published: (2009)
by: Hazaa, Muneer A., et al.
Published: (2009)
An effective modality conflict model for identifying applicable policies during policy evaluation
by: Ibrahim, Hamidah, et al.
Published: (2018)
by: Ibrahim, Hamidah, et al.
Published: (2018)
User access control and security model
by: Crysdian, Cahyo, et al.
Published: (2000)
by: Crysdian, Cahyo, et al.
Published: (2000)
Access control in open distributed systems
by: Udzir, Nur Izura, et al.
Published: (2012)
by: Udzir, Nur Izura, et al.
Published: (2012)
Heterogeneity XACML policy evaluation engine
by: Teo, Poh Kuang, et al.
Published: (2014)
by: Teo, Poh Kuang, et al.
Published: (2014)
A compact bit string accessibility map for secure XML query processing
by: Mirabi, Meghdad, et al.
Published: (2012)
by: Mirabi, Meghdad, et al.
Published: (2012)
Modality conflict analysis in XACML policy evaluation
by: Teo, Poh Kuang, et al.
Published: (2017)
by: Teo, Poh Kuang, et al.
Published: (2017)
A dynamic compressed accessibility map for secure XML querying and updating
by: Mirabi, Meghdad, et al.
Published: (2015)
by: Mirabi, Meghdad, et al.
Published: (2015)
Modality conflict detection model with authorization propagation in policy evaluation
by: Teo, Poh Kuang, et al.
Published: (2020)
by: Teo, Poh Kuang, et al.
Published: (2020)
Push-based XML access control policy languages: a review
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014)
Policy inconsistency detection bassed on RBAC model in cross-organizational collaboration
by: Poh, Kuang Teo, et al.
Published: (2011)
by: Poh, Kuang Teo, et al.
Published: (2011)
Model-based testing of access control requirement in multi-tenant application: an extensive life cycle
by: Duraisamy, Gunavathi, et al.
Published: (2022)
by: Duraisamy, Gunavathi, et al.
Published: (2022)
XML-based declarative access control
by: Steele, R., et al.
Published: (2005)
by: Steele, R., et al.
Published: (2005)
Converting Optically Scanned Regular or Irregular Tables to a Standardised Markup Format to be Accessible to Vision-Impaired
by: Nazemi, A., et al.
Published: (2016)
by: Nazemi, A., et al.
Published: (2016)
Development of a Web Access Control Technique Based User Access Behavior
by: Abdelrahman, Selmaelsheikh
Published: (2004)
by: Abdelrahman, Selmaelsheikh
Published: (2004)
An autonomous role and consideration of electronic health systems with access control in developed countries: a review
by: Salji, Mohd Rafiz, et al.
Published: (2023)
by: Salji, Mohd Rafiz, et al.
Published: (2023)
Security access control system based on Radio Frequency Identification (RFID) and Arduino technologies
by: Ammar Faez, Mohamad Azudin
Published: (2018)
by: Ammar Faez, Mohamad Azudin
Published: (2018)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
Conquest XHTML: a programers guide to extensible HyperText Markup Language
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
Aspect oriented approach to improvement role based access control systems
by: Hazaa, Muneer A., et al.
Published: (2009)
by: Hazaa, Muneer A., et al.
Published: (2009)
A binary access control scheme with high data security.
by: Islam, Md. Rafiqul, et al.
Published: (2002)
by: Islam, Md. Rafiqul, et al.
Published: (2002)
Wireless access control
by: Teck Ping, Lee
Published: (2005)
by: Teck Ping, Lee
Published: (2005)
Secure software architecture approach for role-based access control using aspect-oriented design
by: Saeed Hazaa, Muneer Abdullah
Published: (2010)
by: Saeed Hazaa, Muneer Abdullah
Published: (2010)
A study on physical access control using QR code as virtual identification system for door access control
by: Rajangeran, Ashvini Priya, et al.
Published: (2019)
by: Rajangeran, Ashvini Priya, et al.
Published: (2019)
Analyzing the periocular biometric-based access control systems
by: Mon, Chit Su, et al.
Published: (2020)
by: Mon, Chit Su, et al.
Published: (2020)
An effective naming heterogeneity resolution for XACML policy evaluation in a distributed environment
by: Teo, Poh Kuang, et al.
Published: (2021)
by: Teo, Poh Kuang, et al.
Published: (2021)
Secure Access To Authorized Resources Based On Fingerprint Authentication
by: Elmadani, Ahmed Baba
Published: (2003)
by: Elmadani, Ahmed Baba
Published: (2003)
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Role based access control for knowledge sharing in remote areas
by: Usino, Wendi, et al.
Published: (2011)
by: Usino, Wendi, et al.
Published: (2011)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
Similar Items
-
Security policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2010) -
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment
by: Abu Bakar, Azreena, et al.
Published: (2011) -
Policy inconsistency detection based on RBAC model in cross-organizational collaboration
by: Teo, Poh Kuang, et al.
Published: (2011) -
Modelling and verifying dynamic access control policies in workflow-based healthcare systems
by: Faruqui, Rokan Uddin
Published: (2020) -
Security policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2010)