2010 Developments in E-Systems Engineering 2010
DOI: 10.1109/dese.2010.13
|View full text |Cite
|
Sign up to set email alerts
|

Healthcare Data Access Control Using XACML for Handheld Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…So by making use of the Access Points, the location proofs are provided by the APs in the form of a proof to ensure that the mobile device requesting a service is at a particular location at a particular point in time. This has been very well implemented and researched by various researchers including Saroiu et al [5], Zhu et al [22] and through VeriPlace in [4].…”
Section: System Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…So by making use of the Access Points, the location proofs are provided by the APs in the form of a proof to ensure that the mobile device requesting a service is at a particular location at a particular point in time. This has been very well implemented and researched by various researchers including Saroiu et al [5], Zhu et al [22] and through VeriPlace in [4].…”
Section: System Modelmentioning
confidence: 99%
“…[10] proposes a combination of policies that map users to their mobile agents and make access control decisions for mobile agents by evaluating complex policy sets. [4] deals with the use of P3P policy by extending it for data access control and use of XACML policy [5] in the mobile device for data access control.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on some computations performed using XACML policy and some cryptographic algorithms, the real time key that is used to encrypt the patients information can be obtained. The real time key will be used in the doctors handheld device to decrypt the information and get access to the actual information [8]. XACML was used not only for defining access control policies.…”
Section: Dep Of Information Science and Technologymentioning
confidence: 99%
“…The privacy concerns have been raised to suggest that privacy may be the greatest barrier to the long-term success of ubiquitous computing [3]. The privacy preserving in ubiquitous computing becomes a hot topic recently [25], [30].…”
Section: Introductionmentioning
confidence: 99%