{"id":"https://openalex.org/W2619824381","doi":"https://doi.org/10.1145/3078861.3084176","title":"Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language","display_name":"Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language","publication_year":2017,"publication_date":"2017-05-31","ids":{"openalex":"https://openalex.org/W2619824381","doi":"https://doi.org/10.1145/3078861.3084176","mag":"2619824381"},"language":"en","primary_location":{"id":"doi:10.1145/3078861.3084176","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3078861.3084176","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033936083","display_name":"Thomas MacGahan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099672","display_name":"Accenture (United States)","ror":"https://ror.org/013g16z83","country_code":"US","type":"company","lineage":["https://openalex.org/I4210093804","https://openalex.org/I4210099672"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Thomas MacGahan","raw_affiliation_strings":["Accenture Federal Services, Arlington, VA, USA"],"affiliations":[{"raw_affiliation_string":"Accenture Federal Services, Arlington, VA, USA","institution_ids":["https://openalex.org/I4210099672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065671802","display_name":"Claiborne Johnson","orcid":null},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Claiborne Johnson","raw_affiliation_strings":["University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103459754","display_name":"Armando L Rodriguez","orcid":null},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Armando Rodriguez","raw_affiliation_strings":["University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036156102","display_name":"Jeffery von Ronne","orcid":"https://orcid.org/0000-0002-6575-196X"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jeffery von Ronne","raw_affiliation_strings":["University of Texas at San Antonio &amp; Google, Inc., San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at San Antonio &amp; Google, Inc., San Antonio, TX, USA","institution_ids":["https://openalex.org/I1291425158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103041668","display_name":"Jianwei Niu","orcid":"https://orcid.org/0000-0002-5667-3285"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jianwei Niu","raw_affiliation_strings":["University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5033936083"],"corresponding_institution_ids":["https://openalex.org/I4210099672"],"apc_list":null,"apc_paid":null,"fwci":0.195,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.6026396,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"191","last_page":"198"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/health-insurance-portability-and-accountability-act","display_name":"Health Insurance Portability and Accountability Act","score":0.8087130784988403},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7710117697715759},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.7370062470436096},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.6454691886901855},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6325125098228455},{"id":"https://openalex.org/keywords/software-portability","display_name":"Software portability","score":0.5647493600845337},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.5128991603851318},{"id":"https://openalex.org/keywords/accountability","display_name":"Accountability","score":0.47762221097946167},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.4693494737148285},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4153246581554413},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3989311456680298},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2833133339881897},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.1832546591758728},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.17839133739471436},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.1005958616733551},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.09545615315437317},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08978942036628723}],"concepts":[{"id":"https://openalex.org/C2778306010","wikidata":"https://www.wikidata.org/wiki/Q606563","display_name":"Health Insurance Portability and Accountability Act","level":3,"score":0.8087130784988403},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7710117697715759},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.7370062470436096},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.6454691886901855},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6325125098228455},{"id":"https://openalex.org/C63000827","wikidata":"https://www.wikidata.org/wiki/Q3080428","display_name":"Software portability","level":2,"score":0.5647493600845337},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.5128991603851318},{"id":"https://openalex.org/C2776007630","wikidata":"https://www.wikidata.org/wiki/Q2798912","display_name":"Accountability","level":2,"score":0.47762221097946167},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.4693494737148285},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4153246581554413},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3989311456680298},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2833133339881897},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.1832546591758728},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.17839133739471436},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.1005958616733551},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.09545615315437317},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08978942036628723}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3078861.3084176","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3078861.3084176","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5986301172","display_name":null,"funder_award_id":"CNS-0964710","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W645877529","https://openalex.org/W2001219520","https://openalex.org/W2023083005","https://openalex.org/W2056224542","https://openalex.org/W2157598146","https://openalex.org/W2159817467","https://openalex.org/W2617785199","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2128640905","https://openalex.org/W2011460173","https://openalex.org/W2021092055","https://openalex.org/W4301229064","https://openalex.org/W4301299177","https://openalex.org/W2116878667","https://openalex.org/W2118685970","https://openalex.org/W2111170006","https://openalex.org/W3042284153","https://openalex.org/W4241527182"],"abstract_inverted_index":{"Dependence":[0],"on":[1,136],"reliable":[2],"information":[3,9],"systems":[4],"to":[5,31,46,97,100],"safeguard":[6],"personally":[7],"identifiable":[8],"implies":[10],"a":[11,55,65,102,123],"need":[12],"for":[13,91,110],"privacy":[14,71,113],"policies":[15,43,114],"which":[16],"guide":[17],"the":[18,33,36,76,140,149,152],"release":[19],"and":[20,35,48,50,144,148],"management":[21],"of":[22,61,67,70,75,87,151],"such":[23,42],"information,":[24],"whose":[25],"mismanaged":[26],"disclosure":[27],"can":[28,57],"be":[29,60,98],"damaging":[30],"both":[32],"subject":[34],"organization":[37],"that":[38,54],"releases":[39],"it.":[40],"Enforcing":[41],"requires":[44],"attention":[45],"detail":[47],"care,":[49],"thus":[51],"any":[52],"aid":[53],"compiler":[56,68],"render":[58],"may":[59],"value.":[62],"We":[63],"present":[64],"demonstration":[66],"enforcement":[69],"policy":[72],"by":[73,130],"implementation":[74],"History":[77],"Aware":[78],"Programming":[79],"Language":[80],"(HAPL)":[81],"framework.":[82],"This":[83,105],"framework":[84,127,153],"allows":[85],"expression":[86],"arbitrary":[88],"HAPL":[89],"code":[90,106],"actors":[92],"in":[93,116,139],"an":[94],"actor":[95],"system":[96],"used":[99],"back":[101],"web":[103],"application.":[104,125],"is":[107,128,154],"then":[108],"checked":[109],"compliance":[111],"with":[112],"described":[115,138],"assume-guarantee":[117],"form":[118],"before":[119],"being":[120],"assembled":[121],"into":[122],"functioning":[124],"The":[126],"demonstrated":[129],"implementing":[131],"five":[132],"use":[133],"cases":[134],"based":[135],"scenarios":[137],"Health":[141],"Insurance":[142],"Portability":[143],"Accountability":[145],"Act":[146],"(HIPAA),":[147],"performance":[150],"tested.":[155]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
