Design of access control methods for protecting the confidentiality of patient information in networked systems.
J. W. BowenJ. C. KlimczakM. RuizM. BarnesPublished in: AMIA (1997)
Keyphrases
- access control
- fine grained
- security policies
- access control mechanism
- high assurance
- data protection
- unauthorized access
- data security
- information flow
- dynamic access control
- identity management
- role based access control
- security model
- access control policies
- access control models
- security mechanisms
- data management