REFERENCES
Abomhara, M. and Køien, G. M. (2016). Towards an access
control model for collaborative healthcare systems.
In HEALTHINF’16, 9th International Conference on
Health Informatics, volume 5, pages 213–222.
Abomhara, M., Yang, H., Køien, G. M., and Lazreg, M. B.
(2017). Work-based access control model for coop-
erative healthcare environments: Formal specification
and verification. Journal of Healthcare Informatics
Research, pages 1–33.
Agris, J. L. (2014). Extending the minimum necessary
standard to uses and disclosures for treatment: Cur-
rents in contemporary bioethics. The Journal of Law,
Medicine & Ethics, 42(2):263–267.
Baracaldo, N. and Joshi, J. (2013). An adaptive risk man-
agement and access control framework to mitigate in-
sider threats. Computers & Security, 39:237–254.
Basheer, I. and Hajmeer, M. (2000). Artificial neural net-
works: fundamentals, computing, design, and applica-
tion. Journal of microbiological methods, 43(1):3–31.
Bell, D. E. and LaPadula, L. J. (1975). Computer security
model: Unified exposition and multics interpretation.
MITRE Corp., Bedford, MA, Tech. Rep. ESD-TR-75-
306, June.
Bijon, K. Z., Krishnan, R., and Sandhu, R. (2013). A frame-
work for risk-aware role based access control. In Com-
munications and Network Security (CNS), 2013 IEEE
Conference on, pages 462–469. IEEE.
Chao, C.-A. (2016). The impact of electronic health records
on collaborative work routines: A narrative network
analysis. International journal of medical informatics,
94:100–111.
Cheng, P.-C., Rohatgi, P., Keser, C., Karger, P. A., Wagner,
G. M., and Reninger, A. S. (2007). Fuzzy multi-level
security: An experiment on quantified risk-adaptive
access control. In 2007 IEEE Symposium on Security
and Privacy (SP’07), pages 222–230. IEEE.
Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., and
Chandramouli, R. (2001). Proposed nist standard for
role-based access control. ACM Transactions on In-
formation and System Security (TISSEC), 4(3):224–
274.
Hayes, M. H. (2009). Statistical digital signal processing
and modeling. John Wiley & Sons.
Hu, V. C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin,
K., Miller, R., and Scarfone, K. (2014). Guide to at-
tribute based access control (abac) definition and con-
siderations. NIST Special Publication, 800:162.
Li, N., Wang, Q., Qardaji, W., Bertino, E., Rao, P., Lobo,
J., and Lin, D. (2009). Access control policy com-
bining: theory meets practice. In Proceedings of the
14th ACM symposium on Access control models and
technologies, pages 135–144. ACM.
Probst, C. W., Hunker, J., Gollmann, D., and Bishop, M.
(2010). Insider Threats in Cyber Security, volume 49.
Springer Science & Business Media.
Reitz, R., Common, K., Fifield, P., and Stiasny, E. (2012).
Collaboration in the presence of an electronic health
record. Families, Systems, & Health, 30(1):72.
Rittenberg, L. and Martens, F. (2012). Enterprise risk man-
agement: understanding and communicating risk ap-
petite. COSO, January.
Rostad, L., Nytro, O., Tondel, I., and Meland, P. H. (2007).
Access control and integration of health care systems:
An experience report and future challenges. In Avail-
ability, Reliability and Security, 2007. ARES 2007.
The Second International Conference on, pages 871–
878. IEEE.
Salim, F., Reid, J., and Dawson, E. (2010). Authorization
models for secure information sharing: A survey and
research agenda. The ISC International Journal of In-
formation Security, 2(2):69–87.
Salim, F., Reid, J., Dawson, E., and Dulleck, U. (2011). An
approach to access control under uncertainty. In Avail-
ability, reliability and security (ARES), 2011 Sixth In-
ternational conference on, pages 1–8. IEEE.
Shaikh, R. A., Adi, K., and Logrippo, L. (2012). Dynamic
risk-based decision methods for access control sys-
tems. computers & security, 31(4):447–464.
Shaikh, R. A., Adi, K., Logrippo, L., and Mankovski,
S. (2011). Risk-based decision method for access
control systems. In Privacy, Security and Trust
(PST), 2011 Ninth Annual International Conference
on, pages 189–192. IEEE.
Shoniregun, C. A., Dube, K., and Mtenzi, F. (2010). Elec-
tronic healthcare information security, volume 53.
Springer Science & Business Media.
Stewart, J. M., Chapple, M., and Gibson, D. (2015). CISSP
(ISC)2: Certified Information Systems Security Pro-
fessional Official Study Guide. John Wiley & Sons,
Seventh Edition edition.
Stoneburner, G., Goguen, A. Y., and Feringa, A. (2002).
Special publication 800-30: risk management guide
for information technology systems. National Insti-
tute of Standards & Technology.
US Department of Health and Human Services et al. (2014).
Hipaa privacy rule and sharing information related to
mental health.
Wang, H., Sun, L., and Varadharajan, V. (2010). Purpose-
based access control policies and conflicting analysis.
In Security and Privacy–Silver Linings in the Cloud,
pages 217–228. Springer.
Zhang, R. and Liu, L. (2010). Security models and re-
quirements for healthcare application clouds. In Cloud
Computing (CLOUD), 2010 IEEE 3rd International
Conference on, pages 268–275. IEEE.
Towards Risk-aware Access Control Framework for Healthcare Information Sharing
321