{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:10:48Z","timestamp":1725671448708},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642292613"},{"type":"electronic","value":"9783642292620"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29262-0_15","type":"book-chapter","created":{"date-parts":[[2012,3,27]],"date-time":"2012-03-27T09:27:19Z","timestamp":1332840439000},"page":"105-108","source":"Crossref","is-referenced-by-count":0,"title":["Modelling a User Authorisation and Data Access Framework for Multi-specialty Research Systems in Secondary Health Care"],"prefix":"10.1007","author":[{"given":"Ire","family":"Ogunsina","sequence":"first","affiliation":[]},{"given":"Sarah N.","family":"Lim Choi Keung","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Gavin","family":"Langford","sequence":"additional","affiliation":[]},{"given":"Edward","family":"Tyler","sequence":"additional","affiliation":[]},{"given":"Theodoros N.","family":"Arvanitis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Becker, M.Y., Sewell, P.: Cassandra: Flexible Trust Management, Applied to Electronic Health Records. In: Computer Security Foundations Workshop, pp. 139\u2014154 (2004)"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandu","year":"1996","unstructured":"Sandu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer\u00a029, 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"15_CR3","unstructured":"Ferraiolo, D.F., Kuhn, D.R.: Role Based Access Controls. In: 15th National Computer Security Conference, pp. 554\u2013563 (1992)"},{"key":"15_CR4","unstructured":"Slevin, L.A., Macfie A.: Role Based Access Control for a Medical Database. In: IASTED-Software Engineering and Applications Conference, pp. 19\u201321 (2007)"},{"key":"15_CR5","unstructured":"Covington, M.J., Moyer, M.J., Ahamad, M.: Generalized Role-Based Access Control for Securing Future Applications. Technical Report GIT-CC-00-02. Georgia Institute of Technology (2000)"},{"key":"15_CR6","unstructured":"PERMIS. FAQ (2011), \n \n http:\/\/sec.cs.kent.ac.uk\/permis\/documents\/FAQ.shtml"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Snaith, R.P.: The Hospital Anxiety and Depression Scale. Health Qual. Life Outcomes 1, 29 (2003)","DOI":"10.1186\/1477-7525-1-29"},{"key":"15_CR8","unstructured":"National programme for IT (NPfIT), \n \n http:\/\/www.gpchoice.org\/npfit.aspx"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.ijmedinf.2003.11.018","volume":"73","author":"B. Blobel","year":"2004","unstructured":"Blobel, B.: Authorisation and Access Control for Electronic Health Record Systems. International Journal of Medical Informatics\u00a073, 251\u2013257 (2004)","journal-title":"International Journal of Medical Informatics"},{"key":"15_CR10","unstructured":"HL7. Privacy, Access and Security Services (PASS) Access Control Services Conceptual Model. Release 1 (2010), \n \n http:\/\/hssp-security.wikispaces.com\/PASS+HL7+Balloted+Documents"},{"key":"15_CR11","unstructured":"Farzad, F., Yu, E., Hung, P.C.K.: Role Based Access Control Requirements Model with Purpose Extension. In: Workshop on Requirements Engineering, pp. 207\u2013216 (2007)"},{"issue":"14","key":"15_CR12","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1016\/S0950-5849(03)00097-1","volume":"45","author":"R. Crook","year":"2003","unstructured":"Crook, R., Ince, D., Nuseibeh, B.: Modelling Access Policies Using Roles in Requirements Engineering. Information and Software Technology\u00a045(14), 979\u2013991 (2003)","journal-title":"Information and Software Technology"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Electronic Healthcare"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29262-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T02:39:34Z","timestamp":1556505574000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29262-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642292613","9783642292620"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29262-0_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}