{"id":"https://openalex.org/W2080487111","doi":"https://doi.org/10.4018/jisp.2013070103","title":"A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain","display_name":"A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2080487111","doi":"https://doi.org/10.4018/jisp.2013070103","mag":"2080487111"},"language":"en","primary_location":{"id":"doi:10.4018/jisp.2013070103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jisp.2013070103","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048142991","display_name":"Esraa Omran","orcid":null},"institutions":[{"id":"https://openalex.org/I179311214","display_name":"Gulf University for Science & Technology","ror":"https://ror.org/04d9rzd67","country_code":"KW","type":"education","lineage":["https://openalex.org/I179311214"]}],"countries":["KW"],"is_corresponding":true,"raw_author_name":"Esraa Omran","raw_affiliation_strings":["Gulf University for Science & Technology, Kuwait City, Kuwait","Gulf University for Science and Technology, Kuwait City, Kuwait"],"affiliations":[{"raw_affiliation_string":"Gulf University for Science & Technology, Kuwait City, Kuwait","institution_ids":["https://openalex.org/I179311214"]},{"raw_affiliation_string":"Gulf University for Science and Technology, Kuwait City, Kuwait","institution_ids":["https://openalex.org/I179311214"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033155973","display_name":"Tyrone Grandison","orcid":"https://orcid.org/0000-0003-1989-3913"},"institutions":[{"id":"https://openalex.org/I907500627","display_name":"Ashland (United States)","ror":"https://ror.org/006nxzf98","country_code":"US","type":"company","lineage":["https://openalex.org/I907500627"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tyrone Grandison","raw_affiliation_strings":["Proficiency Labs, Ashland, OR, USA"],"affiliations":[{"raw_affiliation_string":"Proficiency Labs, Ashland, OR, USA","institution_ids":["https://openalex.org/I907500627"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101700491","display_name":"David Nelson","orcid":"https://orcid.org/0000-0003-1163-1222"},"institutions":[{"id":"https://openalex.org/I5728261","display_name":"University of Sunderland","ror":"https://ror.org/04p55hr04","country_code":"GB","type":"education","lineage":["https://openalex.org/I5728261"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"David Nelson","raw_affiliation_strings":["Faculty of Applied Sciences, University of Sunderland, Sunderland, UK"],"affiliations":[{"raw_affiliation_string":"Faculty of Applied Sciences, University of Sunderland, Sunderland, UK","institution_ids":["https://openalex.org/I5728261"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002923280","display_name":"Albert Bokma","orcid":"https://orcid.org/0000-0002-4581-4935"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Albert Bokma","raw_affiliation_strings":["Avedas Information Management, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Avedas Information Management, Karlsruhe, Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5048142991"],"corresponding_institution_ids":["https://openalex.org/I179311214"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.20477864,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"7","issue":"3","first_page":"36","last_page":"52"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7748731374740601},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7118710279464722},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.6729534864425659},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6617841124534607},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.6107707023620605},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5907291769981384},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5210294723510742},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.5175104141235352},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4752923250198364},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4748059809207916},{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information sharing","score":0.4384310841560364},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.41967931389808655},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3911120295524597},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3908978998661041},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1207410991191864},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.0982758104801178}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7748731374740601},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7118710279464722},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.6729534864425659},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6617841124534607},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.6107707023620605},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5907291769981384},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5210294723510742},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.5175104141235352},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4752923250198364},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4748059809207916},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.4384310841560364},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.41967931389808655},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3911120295524597},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3908978998661041},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1207410991191864},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0982758104801178},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.4018/jisp.2013070103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jisp.2013070103","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jisp00:v:7:y:2013:i:3:p:36-52","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jisp.2013070103","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:sure.sunderland.ac.uk:7554","is_oa":false,"landing_page_url":"http://sure.sunderland.ac.uk/id/eprint/7554/","pdf_url":null,"source":{"id":"https://openalex.org/S4306402295","display_name":"Sunderland Repository (University of Sunderland)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I5728261","host_organization_name":"University of Sunderland","host_organization_lineage":["https://openalex.org/I5728261"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W23151629","https://openalex.org/W28656442","https://openalex.org/W126318728","https://openalex.org/W852643139","https://openalex.org/W1511944795","https://openalex.org/W1538715284","https://openalex.org/W1557915535","https://openalex.org/W1594706025","https://openalex.org/W1598832989","https://openalex.org/W1608737606","https://openalex.org/W2057432482","https://openalex.org/W2065246078","https://openalex.org/W2081578468","https://openalex.org/W2103317919","https://openalex.org/W2124080036","https://openalex.org/W2167801706","https://openalex.org/W2914418376","https://openalex.org/W3021135929","https://openalex.org/W4407854879","https://openalex.org/W6635744508","https://openalex.org/W6675844770"],"related_works":["https://openalex.org/W2372156812","https://openalex.org/W2374393728","https://openalex.org/W2386545329","https://openalex.org/W2382286253","https://openalex.org/W2356011375","https://openalex.org/W1795360416","https://openalex.org/W2392979115","https://openalex.org/W819284483","https://openalex.org/W2370002471","https://openalex.org/W2148952798"],"abstract_inverted_index":{"The":[0,153],"importance":[1],"of":[2,15,40,81,86,90,97,105,114,134,146,165],"electronic":[3,43],"healthcare":[4,16,59,120,159],"has":[5],"caused":[6],"numerous":[7],"changes":[8,19],"in":[9,42,51,57,102,157],"both":[10],"substantive":[11],"and":[12,27,65,116,122,141,161,169],"procedural":[13],"aspects":[14],"processes.":[17],"These":[18],"have":[20],"produced":[21],"new":[22],"challenges":[23],"for":[24],"patient":[25,55],"privacy":[26,31,38,47,56,106,117],"information":[28,63,73],"secrecy.":[29],"Traditional":[30],"policies":[32,48],"cannot":[33],"respond":[34],"to":[35,53,148],"rapidly":[36],"increased":[37],"needs":[39],"patients":[41],"healthcare.":[44],"Technically":[45],"enforceable":[46],"are":[49],"needed":[50],"order":[52],"protect":[54],"modern":[58],"with":[60],"its":[61],"cross-organizational":[62],"sharing":[64],"decision":[66],"making.":[67],"This":[68,109],"paper":[69],"proposes":[70,77],"a":[71,78,135,143,163],"personal":[72],"flow":[74],"model":[75],"that":[76],"limited":[79],"number":[80],"acts":[82,92],"on":[83],"this":[84,127],"type":[85],"information.":[87],"Ontology-classified":[88],"chains":[89],"these":[91],"can":[93],"be":[94],"used":[95],"instead":[96],"the":[98,103,111,129,158],"\u201cintended":[99],"business":[100],"purposes\u201d":[101],"context":[104],"access":[107,167],"control.":[108],"enables":[110],"seamless":[112],"integration":[113],"security":[115],"into":[118],"existing":[119],"applications":[121],"their":[123,132],"supporting":[124],"infrastructures.":[125],"In":[126],"paper,":[128],"authors":[130],"present":[131],"idea":[133],"Chain-Based":[136],"Access":[137,150],"Control":[138,151],"(ChBAC)":[139],"mechanism":[140],"provide":[142],"comparative":[144],"analysis":[145],"it":[147],"Role-Based":[149],"(RBAC).":[152],"evaluation":[154],"is":[155],"grounded":[156],"domain":[160],"examines":[162],"range":[164],"typical":[166],"scenarios":[168],"approaches.":[170]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
