Acknowledgement
Supported by : 한국연구재단
References
- Buntin, M. B., Jain, S. H., and Blumenthal, D. 2010. Health information technology: Laying the infrastructure for national health reform. Health Affairs 29, 6, 1214-1219. https://doi.org/10.1377/hlthaff.2010.0503
- Chaudhry, B., Wang, J., Wu, S., Maglione, M., Mojica, W., Roth, E., Morton, S. C., and Shekelle, P. G. 2006. Systematic review: Impact of health information technology on quality, efficiency, and costs of medical care. Ann. Intern. Med. 144, 10, 742-752. https://doi.org/10.7326/0003-4819-144-10-200605160-00125
- Bosch, M., Faber, M. J., Cruijsberg, J., Voerman, G. E., Leatherman, S., Grol, R. P., Hulscher, M., and Wensing, M. 2009. Review article: Effectiveness of patient care teams and the role of clinical expertise and coordination: A literature review. Med. Care Res. and Rev. 66, 6 Suppl., 5S-35S. https://doi.org/10.1177/1077558709343295
- Wang, Qihua, and Hongxia Jin, "Quantified riskadaptive access control for patient privacy protection in health information systems," Proc. of the 6th ACM Symposium on Information, Computer and Communications Security, ACM, 2011.
- Ni, Qun, Elisa Bertino, and Jorge Lobo. "Risk-based access control systems built on fuzzy inferences," Proc. of the 5th ACM Symposium on Information, Computer and Communications Security, ACM, 2010.
- Celikel, Ebru, et al., "A risk management approach to RBAC," Risk and Decision Analysis 1.1 (2009): 21-33.
- Bijon, Khalid Zaman, Ram Krishnan, and Ravi Sandhu, "Risk-aware RBAC sessions," Information Systems Security, Springer Berlin Heidelberg, 2012, 59-74.
- Kandala, Savith, Ravi Sandhu, and Venkata Bhamidipati, "An attribute based framework for riskadaptive access control models," Availability, Reliability and Security (ARES), 2011 Sixth International Conference on. IEEE, 2011.
- Park, J., Sandhu, R.. "Towards usage control models: beyond traditional access control," 7th ACM symposium on Access control models and technologies (SACMAT "02), ACM Press, New York, pp. 57-64, 2002.
- John Scott, "Social Network Analysis," Third Edition, SAGE Publications Ltd., 2012.
- C. Ni, C. Sugimoto, and J. Jiang, "Degree, closeness, and betweenness: application of group centrality measurements to explore macro-disciplinary evolution diachronically," Proc. of the ISSI, pp. 1-13, Durban, South Africa, 2011.
- SALTZER, J. H. AND SCHROEDER, M. D. 1975. The protection of information in computer systems, Proc. IEEE 63, 9 (Sept.), 1278-1308. https://doi.org/10.1109/PROC.1975.9939
- D. H. Kim, Y.-G. Kim, H. P. In, and H. C. Jeong, "A method for risk measurement of botnet's malicious activities," Information Journal, Vol. 17, No. 1, pp. 165-180, 2014.
- Choi Donghee, Dohoon Kim, and Seog Park, "A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems," Computational and mathematical methods in medicine 2015 (2015).
- [Online]. Available: http://openmrs.org/