dc.contributor.author |
Malamateniou, F |
en |
dc.contributor.author |
Vassilacopoulos, G |
en |
dc.contributor.author |
Tsanakas, P |
en |
dc.date.accessioned |
2014-03-01T01:47:07Z |
|
dc.date.available |
2014-03-01T01:47:07Z |
|
dc.date.issued |
1998 |
en |
dc.identifier.issn |
10897771 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/25144 |
|
dc.relation.uri |
http://www.scopus.com/inward/record.url?eid=2-s2.0-0032148235&partnerID=40&md5=8ab3c6f091e6bfb32fc00a2aa2eb4b9f |
en |
dc.subject |
Authorization |
en |
dc.subject |
Healthcare |
en |
dc.subject |
Intranet |
en |
dc.subject |
Virtual patient records |
en |
dc.subject |
Workflow systems |
en |
dc.subject.other |
article |
en |
dc.subject.other |
computer network |
en |
dc.subject.other |
computer security |
en |
dc.subject.other |
medical record |
en |
dc.subject.other |
Computer Communication Networks |
en |
dc.subject.other |
Computer Security |
en |
dc.subject.other |
Medical Records Systems, Computerized |
en |
dc.subject.other |
Health care |
en |
dc.subject.other |
Intranets |
en |
dc.subject.other |
Patient monitoring |
en |
dc.subject.other |
Medical informatics |
en |
dc.subject.other |
Virtual patient record |
en |
dc.subject.other |
Medical computing |
en |
dc.title |
A workflow-based approach to virtual patient record security |
en |
heal.type |
journalArticle |
en |
heal.publicationDate |
1998 |
en |
heal.abstract |
Virtual patient records provide a means for integrated access to patient information that may be scattered around different healthcare organizations (or hospital departments). As Intranets provide among others secure access to medical information they constitute an appropriate technological infrastructure for a virtual patient record implementation. In such cases a security policy can be enforced by combining the security features of the Intranet with the security features of the intraorganizational systems. However when a workflow system is implemented to automate interorganizational healthcare processes an additional security layer is needed. An authorization architecture that serves this purpose is presented in this paper. © 1998 IEEE. |
en |
heal.journalName |
IEEE Transactions on Information Technology in Biomedicine |
en |
dc.identifier.volume |
2 |
en |
dc.identifier.issue |
3 |
en |
dc.identifier.spage |
139 |
en |
dc.identifier.epage |
145 |
en |