Carminati et al., 2013 - Google Patents
A system for timely and controlled information sharing in emergency situationsCarminati et al., 2013
- Document ID
- 669958867575409146
- Author
- Carminati B
- Ferrari E
- Guglielmi M
- Publication year
- Publication venue
- IEEE Transactions on Dependable and Secure Computing
External Links
Snippet
During natural disasters or emergency situations, an essential requirement for an effective emergency management is the information sharing. In this paper, we present an access control model to enforce controlled information sharing in emergency situations. An in-depth …
- 230000002708 enhancing 0 abstract description 12
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Guo et al. | Access control for electronic health records with hybrid blockchain-edge architecture | |
| Bacon et al. | A model of OASIS role-based access control and its support for active security | |
| Hu et al. | Guidelines for access control system evaluation metrics | |
| US10152608B2 (en) | Healthcare privacy violation detection and investigation system and method | |
| Zhang et al. | Mining deviations from patient care pathways via electronic medical record system audits | |
| Yarmand et al. | Behavior-based access control for distributed healthcare systems | |
| Bertino et al. | Analysis of privacy and security policies | |
| Carminati et al. | A system for timely and controlled information sharing in emergency situations | |
| Becker | Cassandra: flexible trust management and its application to electronic health records | |
| Anwar et al. | Access control for multi-tenancy in cloud-based health information systems | |
| Oladimeji et al. | Managing security and privacy in ubiquitous ehealth information interchange | |
| Abomhara et al. | UML/OCL-based modeling of work-based access control policies for collaborative healthcare systems | |
| Steimle et al. | Extended provisioning, security and analysis techniques for the ECHO health data management system | |
| Denhere et al. | A TOGAF based interoperable health information system needs assessment for practitioner–patient interaction | |
| Akhuseyinoglu et al. | A risk-aware access control framework for cyber-physical systems | |
| Carminati et al. | Detection of unspecified emergencies for controlled information sharing | |
| Carminati et al. | Secure information sharing on support of emergency management | |
| Belokosztolszki | Role-based access control policy administration | |
| Dernaïka | A posteriori log analysis and security rules violation detection | |
| Azkia et al. | Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment | |
| Rath et al. | Towards purpose enforcement model for privacy–aware usage control policy in distributed healthcare | |
| Peyrone | Formal models for consent management in healthcare software system development | |
| Gasparini | Risk-aware access control and XACML | |
| Craven et al. | A formal framework for policy analysis | |
| Bombera | Privacy-preserving eHealth: A self-sovereign identity based infrastructure for medical records |