Methods and systems for managing distributed digital medical data

ED Menschik, CR Corio, WF Davis… - US Patent …, 2009 - Google Patents
A network for mediating the peer-to-peer transfer of digital patient medical data includes a
plurality of distributed agents each associated with a health care provider and connected to …

A context-related authorization and access control method based on rbac

M Wilikens, S Feriti, A Sanna, M Masera - Proceedings of the seventh …, 2002 - dl.acm.org
This paper describes an application of authorization and access control based on the Role
Based Access Control (RBAC) method and integrated in a comprehensive trust …

Lightweight privacy‐aware secure authentication scheme for cyber‐physical systems in the edge intelligence era

D Bakkiam Deebak… - … and Computation: Practice …, 2023 - Wiley Online Library
Abstract Internet of Things (IoT) and cyber‐physical systems demand proper real‐time data
processing and analysis to fulfill the essential characteristics of seamless computing …

[PDF][PDF] Application of role-based access control in wireless healthcare information systems

F Hansen, V Oleshchuk - Scandinavian conference in health …, 2003 - researchgate.net
The paper presents a Spatial Role-based Access Control (SRBAC) framework and its
application to healthcare information systems that allows wireless access to information. The …

Enhancing conferencing user experience via components

P Krishnan, N Singh - US Patent 9,094,524, 2015 - Google Patents
6,826,159 B1 1 1/2004 Shaffer et al. 7,099.448 B1 8/2006 Laniepce et al. 7,272,385 B2*
9/2007 Mirouze et al............. 455,414.1 7.460, 656 B2 12/2008 Lam et al. 7,653,013 B1 …

Agile software development: The straight and narrow path to secure software?

T Nicolaysen, R Sassoon, MB Line… - International Journal of …, 2010 - igi-global.com
In this article, the authors contrast the results of a series of interviews with agile software
development organizations with a case study of a distributed agile development effort …

An access control framework for protecting personal electronic health records

AA Izaara, R Ssembatya… - … Conference on Intelligent …, 2018 - ieeexplore.ieee.org
The increasing expansion of wireless systems and the extensive popularity and usage of
mobile devices such as mobile phones and wireless tablets represents a great opportunity …

Implementing context and team based access control in healthcare intranets

CK Georgiadis, IK Mavridis… - … informatics and the …, 2002 - Taylor & Francis
The establishment of an efficient access control system in healthcare intranets is a critical
security issue directly related to the protection of patients' privacy. Our C-TMAC (Context and …

[PDF][PDF] Role based access control for a medical database

LA Slevin, A Macfie - IASTED-Software Engineering and Applications …, 2007 - Citeseer
This paper describes the testing the applicability of Role Based Access Control (RBAC)
within an existing medical database in the Oncology Department at St. Bartholomew's …

Integrating Trust Profiles, Trust Negotiation, and Attribute Based Access Control

E Sanzi, SA Demurjian, J Billings - 2017 5th IEEE International …, 2017 - ieeexplore.ieee.org
Access to sensitive information is traditionally achieved through an authentication and
authorization process via a username/password combination to validate a user's identity that …