Georgiadis, C. K., Mavridis, I., Pangalos, G., and Thomas,
R. K. (2001). Flexible team-based access control us-
ing contexts. In Proceedings of the sixth ACM sym-
posium on Access control models and technologies,
pages 21–27. ACM.
Hu, V. C., Ferraiolo, D., and Kuhn, D. R. (2006). Assess-
ment of access control systems. US Department of
Commerce, National Institute of Standards and Tech-
nology.
Hu, V. C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin,
K., Miller, R., and Scarfone, K. (2014). Guide to at-
tribute based access control (abac) definition and con-
siderations. NIST Special Publication, 800:162.
Hwang, J., Xie, T., Hu, V., and Altunay, M. (2010). Acpt:
A tool for modeling and verifying access control poli-
cies. In Policies for Distributed Systems and Networks
(POLICY), 2010 IEEE International Symposium on,
pages 40–43. IEEE.
Kayem, A. V., Akl, S. G., and Martin, P. (2010). Adaptive
cryptographic access control, volume 48. Springer
Science & Business Media.
Koufi, V. and Vassilacopoulos, G. (2008). Context-aware
access control for pervasive access to process-based
healthcare systems. Studies in health technology and
informatics, 136:679.
Le, X. H., Doll, T., Barbosu, M., Luque, A., and Wang,
D. (2012). An enhancement of the role-based access
control model to facilitate information access manage-
ment in context of team collaboration and workflow.
Journal of biomedical informatics, 45(6):1084–1107.
Majumder, A., Namasudra, S., and Nath, S. (2014). Tax-
onomy and classification of access control models for
cloud environments. In Continued Rise of the Cloud,
pages 23–53. Springer.
Moonian, O., Cheerkoot-Jalim, S., Nagowah, S. D., Khedo,
K. K., Doomun, R., and Cadersaib, Z. (2008).
Hcrbac–an access control system for collaborative
context-aware healthcare services in mauritius. Jour-
nal of Health Informatics in Developing Countries,
2(2).
Motta, G. H. and Furuie, S. S. (2003). A contextual role-
based access control authorization model for elec-
tronic patient record. Information Technology in
Biomedicine, IEEE Transactions on, 7(3):202–207.
Oh, S. and Park, S. (2003). Task–role-based access control
model. Information systems, 28(6):533–562.
Probst, C. W., Hunker, J., Gollmann, D., and Bishop, M.
(2010). Insider Threats in Cyber Security, volume 49.
Springer Science & Business Media.
Rozier, K. Y. (2011). Linear temporal logic symbolic model
checking. Computer Science Review, 5(2):163–203.
Rubio-Medrano, C. E., D’Souza, C., and Ahn, G.-J. (2013).
Supporting secure collaborations with attribute-based
access control. In Collaborative Computing: Net-
working, Applications and Worksharing (Collaborate-
com), 2013 9th International Conference Conference
on, pages 525–530. IEEE.
Russello, G., Dong, C., and Dulay, N. (2008). A workflow-
based access control framework for e-health applica-
tions. In AINAW 2008-Workshops. 22nd International
Conference on, pages 111–120. IEEE.
Samarati, P. and Di Vimercati, S. D. C. (2001). Access con-
trol: Policies, models, and mechanisms. Lecture notes
in computer science, pages 137–196.
Shaikh, R. A., Adi, K., Logrippo, L., and Mankovski, S.
(2010). Inconsistency detection method for access
control policies. In Information Assurance and Se-
curity (IAS), 2010 Sixth International Conference on,
pages 204–209. IEEE.
Shen, H. and Dewan, P. (1992). Access control for collabo-
rative environments. In Proceedings of the 1992 ACM
conference on Computer-supported cooperative work,
pages 51–58. ACM.
Thomas, R. K. (1997). Team-based access control (tmac):
a primitive for applying role-based access controls in
collaborative environments. In Proceedings of the
second ACM workshop on Role-based access control,
pages 13–19. ACM.
Tolone, W., Ahn, G.-J., Pai, T., and Hong, S.-P. (2005). Ac-
cess control in collaborative systems. ACM Comput-
ing Surveys (CSUR), 37(1):29–41.
Ubale Swapnaja, A., Modani Dattatray, G., and Apte Sula-
bha, S. (2014). Analysis of dac mac rbac access con-
trol based models for security. International Journal
of Computer Applications, 104(5).
Verma, S., Kumar, S., and Singh, M. (2012). Comparative
analysis of role base and attribute base access control
model in semantic web. International Journal of Com-
puter Applications, 46(18).
Wang, W. (1999). Team-and-role-based organizational con-
text and access control for cooperative hypermedia en-
vironments. In Proceedings of the tenth ACM Confer-
ence on Hypertext and hypermedia: returning to our
diverse roots: returning to our diverse roots, pages
37–46. ACM.
Wen, Z., Zhou, B., and Wu, D. (2009). Three-layers role-
based access control framework in large financial web
systems. In Computational Intelligence and Software
Engineering, 2009. CiSE 2009. International Confer-
ence on, pages 1–4. IEEE.
Zhang, R. and Liu, L. (2010). Security models and re-
quirements for healthcare application clouds. In Cloud
Computing (CLOUD), 2010 IEEE 3rd International
Conference on, pages 268–275. IEEE.
HEALTHINF 2016 - 9th International Conference on Health Informatics
222