2017
DOI: 10.1016/j.jksuci.2015.08.005
|View full text |Cite
|
Sign up to set email alerts
|

Proposing hierarchy-similarity based access control framework: A multilevel Electronic Health Record data sharing approach for interoperable environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 15 publications
0
5
0
1
Order By: Relevance
“…Shalini Bhartiya [14] proposed an access control framework that applies hierarchy similarity analyser using XACML policies and these policy conflicts can be used in semantic, syntactic, temporal constraints in future scope.…”
Section: Related Workmentioning
confidence: 99%
“…Shalini Bhartiya [14] proposed an access control framework that applies hierarchy similarity analyser using XACML policies and these policy conflicts can be used in semantic, syntactic, temporal constraints in future scope.…”
Section: Related Workmentioning
confidence: 99%
“…It includes over 2000 data sets from 70 major and typically definitive data agencies. This includes the official details of licensed premises provided by the Victorian Commission for Gambling and Liquor Regulation (VCGLR) 4 . As shown in Figure 8, a typical scenario can be depicted where the Zip codes of both data sets facilitates the data linkage of T1DM and locations of bottleshops.…”
Section: Case Study-privacy Protection On Linkage Aurin and Addnmentioning
confidence: 99%
“…The international standard, XACML (eXtensible Access Control Markup Language) includes common request/response protocols and associated policy components to support authorisation [1]. Due to its standardisation, widespread adoption and rich expressiveness, XACML has been widely implemented in EHR systems [2] [3] [4]. In particular, the obligation component of XACML has the potential to seamlessly introduce other policies (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…Sin embargo, al existir una falta de consideración con respecto a la privacidad de la identidad de los propietarios de registros médicos electrónicos, se pueden utilizar técnicas de anonimización para garantizar la privacidad de la identidad de los usuarios. Existen algunos esquemas ABE anónimos que abordan no solo la privacidad de los datos sino también la privacidad de la identidad; por ende, aquellos esquemas proporcionan un análisis de confidencialidad, anonimato y flexibilidad [76].…”
Section: Introductionunclassified