Security policy integration based on role-based access control model in healthcare collaborative environments
Recently research is focused on security policy integration and conflict reconciliation among various healthcare organizations. However, challenging security and privacy risks issues still arisen during sharing sensitive patient data in different large distributed organizations. In this paper, we pr...
| Main Authors: | Teo, Poh Kuang, Ibrahim, Hamidah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Universiti Utara Malaysia
2010
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/59754/ http://psasir.upm.edu.my/id/eprint/59754/1/PG515_521.pdf |
Similar Items
Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2011)
by: Teo, Poh Kuang, et al.
Published: (2011)
Security policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2010)
by: Teo, Poh Kuang, et al.
Published: (2010)
Policy inconsistency detection based on RBAC model in cross-organizational collaboration
by: Teo, Poh Kuang, et al.
Published: (2011)
by: Teo, Poh Kuang, et al.
Published: (2011)
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment
by: Abu Bakar, Azreena, et al.
Published: (2011)
by: Abu Bakar, Azreena, et al.
Published: (2011)
Secure role based access control systems using aspect-orientation designing
by: Hazaa, Muneer A., et al.
Published: (2009)
by: Hazaa, Muneer A., et al.
Published: (2009)
Modelling and verifying dynamic access control policies in workflow-based healthcare systems
by: Faruqui, Rokan Uddin
Published: (2020)
by: Faruqui, Rokan Uddin
Published: (2020)
Aspect oriented approach to improvement role based access control systems
by: Hazaa, Muneer A., et al.
Published: (2009)
by: Hazaa, Muneer A., et al.
Published: (2009)
Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
Role performance trust-based access control for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2016)
by: Salji, Mohd Rafiz, et al.
Published: (2016)
Trust, purpose, and role-based access control model for privacy protection
by: Salji, Mohd Rafiz, et al.
Published: (2019)
by: Salji, Mohd Rafiz, et al.
Published: (2019)
An effective naming heterogeneity resolution for XACML policy evaluation in a distributed environment
by: Teo, Poh Kuang, et al.
Published: (2021)
by: Teo, Poh Kuang, et al.
Published: (2021)
Secure software architecture approach for role-based access control using aspect-oriented design
by: Saeed Hazaa, Muneer Abdullah
Published: (2010)
by: Saeed Hazaa, Muneer Abdullah
Published: (2010)
An effective modality conflict model for identifying applicable policies during policy evaluation
by: Ibrahim, Hamidah, et al.
Published: (2018)
by: Ibrahim, Hamidah, et al.
Published: (2018)
Heterogeneity policy evaluation with modality conflict analysis
by: Teo, Poh Kuang
Published: (2017)
by: Teo, Poh Kuang
Published: (2017)
Push-based XML access control policy languages: a review
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014)
Heterogeneity XACML policy evaluation engine
by: Teo, Poh Kuang, et al.
Published: (2014)
by: Teo, Poh Kuang, et al.
Published: (2014)
Modality conflict analysis in XACML policy evaluation
by: Teo, Poh Kuang, et al.
Published: (2017)
by: Teo, Poh Kuang, et al.
Published: (2017)
User access control and security model
by: Crysdian, Cahyo, et al.
Published: (2000)
by: Crysdian, Cahyo, et al.
Published: (2000)
Modality conflict detection model with authorization propagation in policy evaluation
by: Teo, Poh Kuang, et al.
Published: (2020)
by: Teo, Poh Kuang, et al.
Published: (2020)
Role based access control for knowledge sharing in remote areas
by: Usino, Wendi, et al.
Published: (2011)
by: Usino, Wendi, et al.
Published: (2011)
Security access control system based on Radio Frequency Identification (RFID) and Arduino technologies
by: Ammar Faez, Mohamad Azudin
Published: (2018)
by: Ammar Faez, Mohamad Azudin
Published: (2018)
Secure Access To Authorized Resources Based On Fingerprint Authentication
by: Elmadani, Ahmed Baba
Published: (2003)
by: Elmadani, Ahmed Baba
Published: (2003)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
Policy inconsistency detection bassed on RBAC model in cross-organizational collaboration
by: Poh, Kuang Teo, et al.
Published: (2011)
by: Poh, Kuang Teo, et al.
Published: (2011)
Mosque-based Collaborative Healthcare System (MCHS): Malaysia case study
by: Hassan, Azizah, et al.
Published: (2011)
by: Hassan, Azizah, et al.
Published: (2011)
An Evaluation Of Healthcare Expenditure Policies And Development Of A University-Based Sustainable Healthcare Financing Model
by: Al-Shami, Abdulkareem Mohammed Ahmed
Published: (2017)
by: Al-Shami, Abdulkareem Mohammed Ahmed
Published: (2017)
Collaborative virtual 3D environment for internet-accessible physics experiments
by: Scheucher, T., et al.
Published: (2009)
by: Scheucher, T., et al.
Published: (2009)
Collaborative virtual 3D environment for internet-accessible physics experiments
by: Scheucher, B., et al.
Published: (2009)
by: Scheucher, B., et al.
Published: (2009)
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019)
by: Khan, Burhan ul Islam, et al.
Published: (2019)
Performance and divisional trust and purpose-based access control for privacy preservation
by: Salji, Mohd Rafiz, et al.
Published: (2018)
by: Salji, Mohd Rafiz, et al.
Published: (2018)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Blockchain-based access control scheme for secure shared personal health records over decentralised storage
by: Hussien, Hassan Mansur, et al.
Published: (2021)
by: Hussien, Hassan Mansur, et al.
Published: (2021)
XML-based declarative access control
by: Steele, R., et al.
Published: (2005)
by: Steele, R., et al.
Published: (2005)
Event correlation, extra information and merged policies approaches for integrating intrusion detection and access control systems.
by: Halboob, Waleed, et al.
Published: (2013)
by: Halboob, Waleed, et al.
Published: (2013)
Trust-based access control model with quantification method for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2022)
by: Salji, Mohd Rafiz, et al.
Published: (2022)
Securing U-Healthcare sensor networks using public key based scheme
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
Access control model based on trust, purpose, and role in materialized view for privacy protection
by: Salji, Mohd Rafiz
Published: (2019)
by: Salji, Mohd Rafiz
Published: (2019)
A binary access control scheme with high data security.
by: Islam, Md. Rafiqul, et al.
Published: (2002)
by: Islam, Md. Rafiqul, et al.
Published: (2002)
Similar Items
-
Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2011) -
Security policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2010) -
Policy inconsistency detection based on RBAC model in cross-organizational collaboration
by: Teo, Poh Kuang, et al.
Published: (2011) -
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment
by: Abu Bakar, Azreena, et al.
Published: (2011) -
Secure role based access control systems using aspect-orientation designing
by: Hazaa, Muneer A., et al.
Published: (2009)