{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:22:28Z","timestamp":1725621748634},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642236341"},{"type":"electronic","value":"9783642236358"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23635-8_28","type":"book-chapter","created":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T09:42:06Z","timestamp":1318844526000},"page":"221-228","source":"Crossref","is-referenced-by-count":3,"title":["An Event-Based, Role-Based Authorization Model for Healthcare Workflow Systems"],"prefix":"10.1007","author":[{"given":"Vassiliki","family":"Koufi","sequence":"first","affiliation":[]},{"given":"Flora","family":"Malamateniou","sequence":"additional","affiliation":[]},{"given":"Eleni","family":"Mytilinaiou","sequence":"additional","affiliation":[]},{"given":"George","family":"Vassilacopoulos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Abrahams, A.S., Eyers, D.M., Bacon, J.M.: An Event-Based Paradigm for E-Commerce Application Specification and Execution. LNCS Information Security, Technical Report\u00a06(2), 59\u201368 (2001)","DOI":"10.1016\/S1363-4127(01)00207-2"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Atluri, V.: Security for Workflow Systems. LNCS Information Security, Technical Report 6(2), 59\u201368 (2001)","DOI":"10.1016\/S1363-4127(01)00207-2"},{"issue":"3","key":"28_CR3","first-page":"126","volume":"9","author":"A.R. Botha","year":"2001","unstructured":"Botha, A.R., Eloff, H.P.: A Framework for Access Control in Workflow Systems. Inform. Manage. Comput. Se.\u00a09(3), 126\u2013133 (2001)","journal-title":"Inform. Manage. Comput. Se."},{"issue":"3","key":"28_CR4","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1023\/A:1011461409620","volume":"3","author":"F. Casati","year":"2001","unstructured":"Casati, F., Castano, S., Fugini, M.: Managing Workflow Authorization Constraints through Active Database Technology. Inf. Syst. Front.\u00a03(3), 319\u2013338 (2001)","journal-title":"Inf. Syst. Front."},{"key":"28_CR5","unstructured":"Dey, A.K., Abowed, G.D.: The Context Toolkit: Aiding the Development of Context-Aware Applications. In: Human Factors in Computing Systems (CHI 1999), Pittsburgh, PA, May 15-20, pp. 434\u2013441 (1999)"},{"key":"28_CR6","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/S0954-1810(00)00028-5","volume":"15","author":"A. Goh","year":"2001","unstructured":"Goh, A., Koh, Y.K., Domazet, D.S.: ECA Rule-based Support for Workflows. Artif. Intell Eng.\u00a015, 37\u201346 (2001)","journal-title":"Artif. Intell Eng."},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/11538394_24","volume-title":"Business Process Management","author":"R. Lenz","year":"2005","unstructured":"Lenz, R., Reichert, M.: IT Support for Business processes. In: van der Aalst, W.M.P., Benatallah, B., Casati, F., Curbera, F. (eds.) BPM 2005. LNCS, vol.\u00a03649, pp. 354\u2013363. Springer, Heidelberg (2005)"},{"issue":"3","key":"28_CR8","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1109\/4233.735778","volume":"2","author":"F. Malamateniou","year":"1998","unstructured":"Malamateniou, F., Vassilacopoulos, G., Tsanakas, P.: A Workflow Based Approach to Virtual Patient Record Security. IEEE T. Inf. Technol. B.\u00a02(3), 139\u2013145 (1998)","journal-title":"IEEE T. Inf. Technol. B."},{"key":"28_CR9","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-0-387-75494-9_30","volume":"2","author":"X. Zhou","year":"2008","unstructured":"Zhou, X., Wang, Z.: An Access Control Model of Workflow System Integrating RBAC and TBAC. Integration and Innovation Orient to E-Society\u00a02, 246\u2013251 (2008)","journal-title":"Integration and Innovation Orient to E-Society"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Xing, G., Xue, S., Liu, F.: Design of Role-Based Security Access Control Model in the Workflow. In: 1st IEEE International Conference on Information Science and Engineering (ICISE 2009), Nanjing, Jiangsu China, December 26-28, pp. 1711\u20131715 (2009)","DOI":"10.1109\/ICISE.2009.487"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Zhao, H., Fang, Z., Xu, P., Zhao, L., Liu, J., Wang, T.: An Improved Role-Based Workflow Access Control Model. In: 5th International Conference on Information Technology: New Generations (ITNG 2008), Las Vegas, Nevada, USA, April 7-8 (2008)","DOI":"10.1109\/ITNG.2008.196"},{"key":"28_CR12","unstructured":"DeCarlo, A.L.: Dynamic Business Process Management (BPM): Applying a Role-Based Approach to Business Process Management, InformationWeek, Business Technology Network (2009), http:\/\/business-agility.techweb.com\/articles\/02042009.jhtml"},{"key":"28_CR13","unstructured":"Byron, D.: Role-based Business Process Management: A Good Way to Think of BPM, IT Business Edge (2009), http:\/\/www.itbusinessedge.com\/cm\/blogs\/byron\/role-based-business-process-management-a-good-way-to-think-of-bpm\/?cs=34553"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Electronic Healthcare"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23635-8_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T14:57:46Z","timestamp":1560783466000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23635-8_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642236341","9783642236358"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23635-8_28","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2011]]}}}