2018
DOI: 10.1109/access.2018.2800288
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
47
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 97 publications
(47 citation statements)
references
References 40 publications
0
47
0
Order By: Relevance
“…The approach presented is able to protect EHR from insider attacks as EHR can only be view by those that are able to supply the appropriate attributes. Seol et al in [25] present a cloud-based EHR model that performs ABAC using XACML. The combination of XML encryption and XML digital signatures are used as security and privacy preserving technique.…”
Section: B Application Of Abac In Electronic Health Record (Ehr)mentioning
confidence: 99%
See 1 more Smart Citation
“…The approach presented is able to protect EHR from insider attacks as EHR can only be view by those that are able to supply the appropriate attributes. Seol et al in [25] present a cloud-based EHR model that performs ABAC using XACML. The combination of XML encryption and XML digital signatures are used as security and privacy preserving technique.…”
Section: B Application Of Abac In Electronic Health Record (Ehr)mentioning
confidence: 99%
“…The authors utilize XAMCL for providing fine-grained authorization and access to FHIR resources. Seol et al in [25] employ XACML with XML encryption and XML digital signatures as additional measure for ensuring that the privacy and security of EHR are preserved.…”
Section: A Comparison Of the Different Approachesmentioning
confidence: 99%
“…Attribute-Based Access Control (ABAC), also known as Policy Based Access Control (PBAC) refers to defining access policies and authorizing access to resources and data based on certain attributes defined by the organizations [26,27]. Attributes can vary from organization to organization.…”
Section: Attribute-based Access Controlmentioning
confidence: 99%
“…The XML signature processing method originates from the XMLDSIG specification, but different authors [3], [7], [32], [33], [41], [46]- [49] differently emphasize the actions that would be performed.…”
Section: Related Workmentioning
confidence: 99%