Skip to main content
. 2023 Oct 12;9:e1626. doi: 10.7717/peerj-cs.1626

Table 1. The notations in this article.

Notation Description
CA Certificate authority
RK Randomly generated symmetric key
DB Database
PK Private key of an organization
PID Patient Unique Identity
Encr Encryption of data using a specific key
MID The term MID refers to a member’s unique identity
Dsign Digital signature of data, which is signed by admin
secKey A member’s secret key
r Refers to resources such as a patient’s medical records/Resources
Evaluates whether either policy has been satisfied
R1, R2 Rn Roles and permitted operations for users 1, 2…n
Policysub The data requester’s authorization to access data resources
α A user’s unique attributes
^ Requester must conform to the organization’s policies, data policies, and allowed actions
T1 Starting time for data requests
T2 Ending time for data requests
W( an) Weight of a feature in relation to attribute ( an)
R( an) Range of a selected attribute ( an)
D(p) Severity level of patient ‘p’
ET In case of an emergency, a team was created to get patient records
PR Refers to the access control policy rule