Access control is a key feature of healthcare systems. Up until recently most healthcare information systems have been local to a healthcare facility and accessible only to clinicians. Currently there is a move towards making health information more accessible to patients. One example is the Persona
[ACM Press the 2nd ACM workshop - Alexandria, Virginia, USA (2008.10.31-2008.10.31)] Proceedings of the 2nd ACM workshop on Computer security architectures - CSAW '08 - Personalized access control for a personally controlled health record
✍ Scribed by Røstad, Lillian; Nytrø, Øystein
- Book ID
- 121248920
- Publisher
- ACM Press
- Year
- 2008
- Weight
- 188 KB
- Category
- Article
- ISBN
- 1605583006
No coin nor oath required. For personal study only.
📜 SIMILAR VOLUMES
Security research has long focused on protecting against outside attackers. This was augmented with protection against insider threats, but recently networked business is emerging. With it a new threat is emerging: security against the business partner. A possible solution is secure multi-party com
Tahoe is a system for secure, distributed storage. It uses capabilities for access control, cryptography for confidentiality and integrity, and erasure coding for fault-tolerance. It has been deployed in a commercial backup service and is currently operational. The implementation is Open Source.