1. ]1[ I. B. Ida, A. Jemai, and A. Loukil, "A survey on security of IoT in the context of ehealth and clouds," in Proceedings of 11th International Design Test Symposium (IDT), pp.25-30, Dec2016. [
DOI:10.1109/IDT.2016.7843009]
2. [2] A. J. Jara, A. F. Alcolea, M. A. Zamora, A. F. G. Skarmeta, and M. Alsaedy, "Drugs interaction checker based on iot," in Proceedings of 2010 Internet of Things (IOT), pp.1-8, Nov2010. [
DOI:10.1109/IOT.2010.5678458]
3. [3] A, Kevin, "That 'internet of things' thing," RFID journal, vol. 22, pp.97-114, Jul2009.
4. [4] D.Lu and T.Liu, "The application of iot in medical system," in Proceedings of 2011 IEEE International Symposium on IT in Medicine and Education, vol.1, pp.272-275, Dec2011.
5. [5] R. Marti, J. Delgado, and X. Perramon, "Security specification and implementation for mobile e-health services," in Proceedings of 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, March.2004, pp.241-248. [
DOI:10.1109/EEE.2004.1287316]
6. [6] F. Rezaeibagha and Y. Mu, "Distributed clinical data sharing via dynamic access-control policy transformation," International Journal of Medical Informatics, vol.89, no.Supplement C, pp.25-31, 2016. [
DOI:10.1016/j.ijmedinf.2016.02.002] [
PMID]
7. [7] I. lakovidis, "Towards Personal Health Record: Current Situation, Obstacles and Trends in Implementation of Electronic Healthcare Record in Europe," International Journal of Medical Informatics, vol.52, pp.105-115, 1998. [
DOI:10.1016/S1386-5056(98)00129-4]
8. [8] M.Sicuranza, A.Esposito, and M.Ciampi, "A view-based access control model for her systems," in Proceedings of Intelligent Distributed Computing VIII, pp.443-452, Springer, 2015. [
DOI:10.1007/978-3-319-10422-5_46]
9. [9] M. Abomhara, H. Yang, G. M. Køien, and M. B. Lazreg, "Work-based access control model for cooperative healthcare environments: Formal specification and verification," Journal of Healthcare Informatics Research, vol.1, pp.19-51, Jun2017. [
DOI:10.1007/s41666-017-0004-7]
10. [10] H. S. G. Pussewalage and V. A. Oleshchuk, "An attribute based access control scheme for secure sharing of electronic health records," in Proceedings of 18th IEEE International Conference on e-Health Networking, Applications and Services (Healthcom), Sept.2016, pp.1-6. [
DOI:10.1109/HealthCom.2016.7749516]
11. [11] M.Sicuranza and A.Esposito, "An access control model for easy management of patient privacy in her systems," in Proceedings of 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), Dec.2013, pp.463-470. [
DOI:10.1109/ICITST.2013.6750243]
12. [12] A. Ouaddah, H. Mousannif, A. A. Elkalam, and A. A. Ouahman, "Access control in the internet of things: Big challenges and new opportunities," Computer Networks, vol.112, no.Supplement C, pp.237-262, 2017. [
DOI:10.1016/j.comnet.2016.11.007]
13. [13] M.F.F.Khan and K.Sakamura, "A secure and flexible e-health access control system with provisions for emergency access overrides and delegation of access privileges," in Proceedings of 18th International Conference on Advanced Communication Technology (ICACT), pp.541-546, Jan2016. [
DOI:10.1109/ICACT.2016.7423463]
14. [14] M. Jayabalan and T. O'Daniel, "Access control and privilege management in electronic health record: a systematic literature review," Journal of Medical Systems, vol.40, p.261, Oct2016. [
DOI:10.1007/s10916-016-0589-z] [
PMID]
15. [15] M.F.F.Khan and K.Sakamura, "Context-aware access control for clinical information systems," in Proceedings of 2012 International Conference on Innovations in Information Technology (IIT), March.2012, pp.123-128. [
DOI:10.1109/INNOVATIONS.2012.6207715]
16. [16] C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas, "Flexible team-based access control using contexts," in Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, SACMAT'01, (NewYork, NY, USA), pp.21-27, 2001. [
DOI:10.1145/373256.373259]
17. [17] M. Yarmand, K. Sartipi, and D. Down, "Behavior-based access control for distributed healthcare environment," in Computer-Based Medical Systems, 2008. CBMS'08. 21st IEEE International Symposium on, pp.126-131, June2008. [
DOI:10.1109/CBMS.2008.14]
18. [18] E. Georgakakis, S. Nikolidakis, D. Vergados, and C. Douligeris, "Spatio temporal emergency role based access control (stem-rbac): A time and location aware role based access control model with a break the glass mechanism," in Computers and Communications (ISCC): 2011 IEEE Symposium on, pp. 764-770, June2011. [
DOI:10.1109/ISCC.2011.5983932]
19. [19] Q.Ni, A.Trombetta, E.Bertino, andJ.Lobo, "Privacy-aware role based access control, " in Proceedings of 12th ACM Symposium on Access Control Models and Technologies, SACMAT '07, pp.41-50, ACM, 2007. [
DOI:10.1145/1266840.1266848]
20. [20] N. Yang, H. Barringer, and N. Zhang, "A purpose-based access control model," in Proceedings of Third International Symposium on Information Assurance and Security, pp.143-148, Aug2007. [
DOI:10.1109/IAS.2007.29]
21. [21] K. Seol, Y.-G. Kim, E. Lee, Y.-D. Seo, and D.-K. Baik, ''Privacy preserving attribute-based access control model for XML-based electronic health record system,'' IEEE Access, vol. 6, pp. 9114-9128, 2018. [
DOI:10.1109/ACCESS.2018.2800288]
22. [22] Majeed, Abdul, "Attribute-centric anonymization scheme for improving user privacy and utility of publishing e-health data," Journal of King Saud University-Computer and Information Sciences, March 2018. [
DOI:10.1016/j.jksuci.2018.03.014]
23. [23] P.Gope and R.Amin, "A novel reference security model with the situation based access policy for accessing ephr data," Journal of Medical Systems, vol.40, p.242, Sep2016. [
DOI:10.1007/s10916-016-0620-4] [
PMID]
24. [24] H. Narayanan and M. Giine, "Ensuring access control in cloud provisioned healthcare systems," in Consumer Communications and Networking Conference (CCNC): 2011 IEEE, Jan.2011, pp.247-251. [
DOI:10.1109/CCNC.2011.5766466]
25. [25] US Department of Health and Human Services, "Public Law 104-191: Health Insurance Portability and Accountability Act of 1996," Retrieved November 24 (2003): 2003.
26. [26] J. Jing, A. Gail-Joon, H. Hongxin, J. Michael, and Z.Xinwen, "Patient-centric authorization framework for electronic healthcare services," computers & security, vol.30, no.2-3, pp.116-127, 2011. [
DOI:10.1016/j.cose.2010.09.001]
27. [27] M.A. Doostari, M. Miabi, and M. Momeni, "Proposing a privacy and anonymity protocol in ehealth using public key infrastructure", in Proceedings of the 4th International Conference on Applied Research in Computer Engineering and Signal Processing, Tehran, Iran, 2016.
28. [28] F. hashemibeni, "Privacy preserving access control in iot for ehealth," Master's thesis, Sharif University of Technology, September 2015.