Role-Based Access Control Models
Computer
An access control language for web services
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Separation of Duty in Role-based Environments
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Organization based access control
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Trust-serv: model-driven lifecycle management of trust negotiation policies for web services
Proceedings of the 13th international conference on World Wide Web
Security Policy Reconciliation in Distributed Computing Environments
POLICY '04 Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks
A Trust-based Context-Aware Access Control Model for Web-Services
ICWS '04 Proceedings of the IEEE International Conference on Web Services
Authorization and Privacy for Semantic Web Services
IEEE Intelligent Systems
A Fine-Grained Access Control Model for Web Services
SCC '04 Proceedings of the 2004 IEEE International Conference on Services Computing
An Access Control Model for Web Services in Business Process
WI '04 Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence
Access control in collaborative systems
ACM Computing Surveys (CSUR)
Frameworks for Secured Business Process Management Systems
SERA '06 Proceedings of the Fourth International Conference on Software Engineering Research, Management and Applications
Access Control and Authorization Constraints for WS-BPEL
ICWS '06 Proceedings of the IEEE International Conference on Web Services
A Web Services Secure Conversation Establishment Protocol Based on Forwarded Trust
ICWS '06 Proceedings of the IEEE International Conference on Web Services
Using SAML and XACML for Complex Resource Provisioning in Grid Based Applications
POLICY '07 Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks
Provisions and obligations in policy management and security applications
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Web services discovery in secure collaboration environments
ACM Transactions on Internet Technology (TOIT)
Using Description Logic and Rules to Determine XML Access Control
DEXA '07 Proceedings of the 18th International Conference on Database and Expert Systems Applications
Toward a Usage-Based Security Framework for Collaborative Computing Systems
ACM Transactions on Information and System Security (TISSEC)
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
POLICY '08 Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks
Access control: what is required in business collaboration?
ADC '09 Proceedings of the Twentieth Australasian Conference on Australasian Database - Volume 92
Design science in information systems research
MIS Quarterly
Journal of Theoretical and Applied Electronic Commerce Research
Hi-index | 0.00 |
Modern healthcare systems require collaborations between individual social entities such as hospitals, medical centers, emergency services and community services. One of the most critical issues in this setting is security and privacy, i.e., who can access what and based on which condition(s). In the healthcare system that crosses different administrative domains, each business unit has its own security policies defined and enforced. Therefore the challenge is how security policies shall be specified, compared and integrated if necessary depending on the nature of the inter-domain collaboration. In this paper, we discuss the challenging access control issues in cross-domain healthcare systems. A framework is provided to support authorization control in such an environment, which takes collaboration semantics into account, as well as individual participant's authorization policies.