To see the other types of publications on this topic, follow the link: Authorization Policie.

Journal articles on the topic 'Authorization Policie'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Authorization Policie.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Xu, Yang, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, and Yaoxue Zhang. "A Feasible Fuzzy-Extended Attribute-Based Access Control Technique." Security and Communication Networks 2018 (June 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/6476315.

Full text
Abstract:
Attribute-based access control (ABAC) is a maturing authorization technique with outstanding expressiveness and scalability, which shows its overwhelmingly competitive advantage, especially in complicated dynamic environments. Unfortunately, the absence of a flexible exceptional approval mechanism in ABAC impairs the resource usability and business time efficiency in current practice, which could limit its growth. In this paper, we propose a feasible fuzzy-extended ABAC (FBAC) technique to improve the flexibility in urgent exceptional authorizations and thereby improving the resource usability and business timeliness. We use the fuzzy assessment mechanism to evaluate the policy-matching degrees of the requests that do not comply with policies, so that the system can make special approval decisions accordingly to achieve unattended exceptional authorizations. We also designed an auxiliary credit mechanism accompanied by periodic credit adjustment auditing to regulate expediential authorizations for mitigating risks. Theoretical analyses and experimental evaluations show that the FBAC approach enhances resource immediacy and usability with controllable risk.
APA, Harvard, Vancouver, ISO, and other styles
2

Sciberras, Josette, Raymond Zammit, and Patricia Vella Bonanno. "The European framework for intellectual property rights for biological medicines." Generics and Biosimilars Initiative Journal 10, no. 4 (December 15, 2021): 172–83. http://dx.doi.org/10.5639/gabij.2021.1004.022.

Full text
Abstract:
Introduction: The Pharmaceutical Strategy for Europe (2020) proposes actions related to intellectual property (IP) rights as a means of ensuring patients’ access to medicines. This review aims to describe and discuss the European IP framework and its impact on accessibility of biological medicines and makes some recommendations. Methods: A non-systematic literature review on IP for biological medicines was conducted. Data on authorizations and patent and exclusivity expiry dates of biological medicines obtained from the European Medicines Agency’s (EMA) website and literature was analysed quantitatively and qualitatively. Results: The analysis showed that as at end July 2021, 1,238 medicines were authorized in Europe, of which 332 (26.8%) were biological medicines. There were only 55 biosimilars for 17 unique biologicals. There is an increasing trend in biological authorizations but signifi cant delays in submission of applications for marketing authorization of biosimilars, with no signifi cant diff erences in the time for assessment for marketing authorization between originator biologicals and biosimilars. For some of the more recent biosimilars, applications for authorization were submitted prior to patent and exclusivity expiry. COVID vaccines confi rmed the impact of knowledge transfer on accessibility, especially when linked to joint procurement. Discussion: IP protects originator products and impacts the development of biosimilars. Strategies to improve competition in the EU biological market are discussed. Pricing policies alone do not increase biosimilar uptake since patients are switched to second generation products. Evergreening strategies might be abusing the IP framework, and together with trade secrets and disproportionate prices compared to R & D and manufacturing costs lead to an imbalance between market access and innovation. Conclusion: The European Pharmaceutical Strategy should focus on IP initiatives that support earlier authorization of biosimilars of new biologicals. Recommendations include knowledge sharing, simplifi cation of the regulatory framework and transparency of prices and R & D costs.
APA, Harvard, Vancouver, ISO, and other styles
3

Bai, Yun, and Vijay Varadharajan. "On transformation of authorization policies." Data & Knowledge Engineering 45, no. 3 (June 2003): 333–57. http://dx.doi.org/10.1016/s0169-023x(02)00194-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sabri, Khair Eddin. "An Algebraic Model to Analyze Role-Based Access Control Policies." Modern Applied Science 12, no. 10 (September 12, 2018): 50. http://dx.doi.org/10.5539/mas.v12n10p50.

Full text
Abstract:
Role-Based Access Control (RBAC) is a well known access control model used to preserve the confidentiality of information by specifying the ability of users to access information based on their roles. Usually these policies would be manipulated by combining or comparing them especially when defined in a distributed way. Furthermore, these policies should satisfy predefined authorization constraints. In this paper, we present an algebraic model for specifying and analyzing RBAC policies. The proposed model enables us to specify policies and verify the satisfaction of predefined authorization constraints. Furthermore, the model allows us to combine policies and analyze their effect on predefined constraints. The model consists of few operators that give simplicity in specifying polices. We present a prototype tool used for facilitating the analysis.
APA, Harvard, Vancouver, ISO, and other styles
5

WANG, Qiang, Qiao LIU, and Zhi-guang QIN. "Change impact analysis in authorization policies." Journal of Computer Applications 31, no. 1 (March 21, 2011): 115–17. http://dx.doi.org/10.3724/sp.j.1087.2011.00115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fournet, Cédric, Andrew D. Gordon, and Sergio Maffeis. "A type discipline for authorization policies." ACM Transactions on Programming Languages and Systems 29, no. 5 (August 2, 2007): 25. http://dx.doi.org/10.1145/1275497.1275500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Pei Wu. "The Research of Temporal-Based Authorization for Group-Centric Secure Information Sharing." Advanced Materials Research 143-144 (October 2010): 1223–27. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.1223.

Full text
Abstract:
In this paper, we propose a temporal-based aythorization model for Group-centric Secure Information Sharing(g-SIS) . The traditional approach to information sharing focuses on attaching attributes and policies to an object as it is disseminated from producer to consumers in a system. In contrast, group-centric sharing brings subjects and objects together in a group to facilitate sharing. In such contexts, authorizations are influenced by the temporal ordering of subject and object group membership. That is, the authorizations are decided by the time that subject joins group and the time that object is added to group. But, the model doesn’t consider the time constraint of group enabling and access enabling. For example, a secure meeting room is open only at 8:00—10:00 am and 15:00—17:00 pm every Monday. We develop a temporal-based authorization model for group-centric information sharing which takes the temporal intervals of group and access enabling into consideration. We also discuss a usage scenario to illustrate practical application in secure meeting system.
APA, Harvard, Vancouver, ISO, and other styles
8

Iyer, Padmavathi, and Amirreza Masoumzadeh. "Learning Relationship-Based Access Control Policies from Black-Box Systems." ACM Transactions on Privacy and Security 25, no. 3 (August 31, 2022): 1–36. http://dx.doi.org/10.1145/3517121.

Full text
Abstract:
Access control policies are crucial in securing data in information systems. Unfortunately, often times, such policies are poorly documented, and gaps between their specification and implementation prevent the system users, and even its developers, from understanding the overall enforced policy of a system. To tackle this problem, we propose the first of its kind systematic approach for learning the enforced authorizations from a target system by interacting with and observing it as a black box. The black-box view of the target system provides the advantage of learning its overall access control policy without dealing with its internal design complexities. Furthermore, compared to the previous literature on policy mining and policy inference, we avoid exhaustive exploration of the authorization space by minimizing our observations. We focus on learning relationship-based access control (ReBAC) policy, and show how we can construct a deterministic finite automaton (DFA) to formally characterize such an enforced policy. We theoretically analyze our proposed learning approach by studying its termination, correctness, and complexity. Furthermore, we conduct extensive experimental analysis based on realistic application scenarios to establish its cost, quality of learning, and scalability in practice.
APA, Harvard, Vancouver, ISO, and other styles
9

Schwartz, Aaron L., Troyen A. Brennan, Dorothea J. Verbrugge, and Joseph P. Newhouse. "Measuring the Scope of Prior Authorization Policies." JAMA Health Forum 2, no. 5 (May 28, 2021): e210859. http://dx.doi.org/10.1001/jamahealthforum.2021.0859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Becker, Moritz Y., and Sebastian Nanz. "A logic for state-modifying authorization policies." ACM Transactions on Information and System Security 13, no. 3 (July 2010): 1–28. http://dx.doi.org/10.1145/1805974.1805976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Basile, Cataldo, Daniele Canavese, Christian Pitscheider, Antonio Lioy, and Fulvio Valenza. "Assessing network authorization policies via reachability analysis." Computers & Electrical Engineering 64 (November 2017): 110–31. http://dx.doi.org/10.1016/j.compeleceng.2017.02.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Van Maldegem, Koen. "The Biocidal Products Directive." European Energy and Environmental Law Review 7, Issue 10 (October 1, 1998): 261–68. http://dx.doi.org/10.54648/eelr1998042.

Full text
Abstract:
A more detailed review of the provisions of the Biocidal Products Directive than that appearing at [1998] EELR 204. The position in the Member States. The background to the Directive. Scope; definitions. Procedures for EU authorizations of active substances and for Member State authorizations of products containing active substances; data to be included in application dossiers - basic and specific data. Procedure for the inclusion of an active substance in Annex I, I A or IB: who may apply; the dossier on the active substance and on at least one product containing the active substance; evaluation by the reviewing Member State - completeness check, evaluation, report; Commission proposal and decision on the application; duration and renewal of listing; terms of listing; consequences of refusal of an application. Comparative assessment of active substances leading to refusal of listing or de-listing of an active substance where an alternative substance, posing less risk, is already listed - a shift from risk assessment to risk management; proposed technical guidance on comparative assessment. Product authorization by Member States. Mutual recognition of product authorizations; procedure; refusal to grant mutual recognition; recognition subject to restrictions; modifications to original authorization. Technical aspects: principles for the evaluation of active substances and products; extensive data requirements; risk assessment based on the identification of hazards, assessment of exposure and likelihood that hazards will arise. Classification, packaging, labelling and safety data sheets in respect of biocidal products and active substances. The expense of meeting the data requirements for listing; confidentiality to be observed by the competent authorities if so requested by the applicant; justification for such a request; data protection and its consequences; differences between confidentiality and data protection; periods of data protection; access to the data of other applicants by agreement. "Task forces" and cooperation in the use and development of data - advantages and disadvantages. Ten-year transitional period and review of existing active substances; Enforcement by the Member States; their discretion; interpretation of the Directive, which is based on Article 100(a), EC Treaty (the internal market).
APA, Harvard, Vancouver, ISO, and other styles
13

Ghiselli, A., L. Magnoni, F. Stagni, and Z. Riccardo. "Enriched namespace to support content-aware authorization policies." Journal of Physics: Conference Series 119, no. 6 (July 1, 2008): 062031. http://dx.doi.org/10.1088/1742-6596/119/6/062031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Genitsaridi, Irini, Antonis Bikakis, and Grigoris Antoniou. "DEAL." International Journal of Ambient Computing and Intelligence 3, no. 4 (October 2011): 9–24. http://dx.doi.org/10.4018/jaci.2011100102.

Full text
Abstract:
Authorization is an open problem in Ambient Intelligence environments. The difficulty of implementing authorization policies lies in the open and dynamic nature of such environments. The information is distributed among various heterogeneous devices that collect, process, change, and share it. Previous work presented a fully distributed approach for reasoning with conflicts in ambient intelligence systems. This paper extends previous results to address authorization issues in distributed environments. First, the authors present the formal high-level authorization language DEAL to specify access control policies in open and dynamic distributed systems. DEAL has rich expressive power by supporting negative authorization, rule priorities, hierarchical category authorization, and nonmonotonic reasoning. The authors then define the language semantics through Defeasible Logic. Finally, they demonstrate the capabilities of DEAL in a use case Ambient Intelligence scenario regarding a hospital facility.
APA, Harvard, Vancouver, ISO, and other styles
15

Feješ, Ištvan. "The pre-trial procedure and authorizations of the police." Glasnik Advokatske komore Vojvodine 74, no. 9-10 (2002): 285–89. http://dx.doi.org/10.5937/gakv0210285f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Protiére, Christel, Rachel Baker, Dominique Genre, Anthony Goncalves, and Patrice Viens. "Marketing Authorization Procedures for Advanced Cancer Drugs: Exploring the Views of Patients, Oncologists, Healthcare Decision Makers, and Citizens in France." Medical Decision Making 37, no. 5 (February 15, 2017): 555–66. http://dx.doi.org/10.1177/0272989x17691953.

Full text
Abstract:
Background. The past decades have seen advances in cancer treatments in terms of toxicity and side effects but progress in the treatment of advanced cancer has been modest. New drugs have emerged improving progression free survival but with little impact on overall survival, raising questions about the criteria on which to base decisions to grant marketing authorizations and about the authorization procedure itself. For decisions to be fair, transparent and accountable, it is necessary to consider the views of those with relevant expertise and experience. Methods. We conducted a Q-study to explore the views of a range of stakeholders in France, involving: 54 patients (18 months after diagnosis); 50 members of the general population; 27 oncologists; 19 healthcare decision makers; and 2 individuals from the pharmaceutical industry. Results. Three viewpoints emerged, focussing on different dimensions entitled: 1) ‘Quality of life (QoL), opportunity cost and participative democracy’; 2)‘QoL and patient-centeredness’; and 3) ‘Length of life’. Respondents from all groups were associated with each viewpoint, except for healthcare decision makers, who were only associated with the first one. Conclusion. Our results highlight plurality in the views of stakeholders, emphasize the need for transparency in decision making processes, and illustrate the importance of a re-evaluation of treatments for all 3 viewpoints. In the context of advanced cancer, our results suggest that QoL should be more prominent amongst authorization criteria, as it is a concern for 2 of the 3 viewpoints.
APA, Harvard, Vancouver, ISO, and other styles
17

Hulkower, Rachel L., Meghan Kelley, Lindsay K. Cloud, and Susanna N. Visser. "Medicaid Prior Authorization Policies for Medication Treatment of Attention-Deficit/Hyperactivity Disorder in Young Children, United States, 2015." Public Health Reports 132, no. 6 (October 26, 2017): 654–59. http://dx.doi.org/10.1177/0033354917735548.

Full text
Abstract:
Objectives: In 2011, the American Academy of Pediatrics updated its guidelines for the diagnosis and treatment of children with attention-deficit/hyperactivity disorder (ADHD) to recommend that clinicians refer parents of preschoolers (aged 4-5) for training in behavior therapy and subsequently treat with medication if behavior therapy fails to sufficiently improve functioning. Data available from just before the release of the guidelines suggest that fewer than half of preschoolers with ADHD received behavior therapy and about half received medication. About half of those who received medication also received behavior therapy. Prior authorization policies for ADHD medication may guide physicians toward recommended behavior therapy. Characterizing existing prior authorization policies is an important step toward evaluating the impact of these policies on treatment patterns. We inventoried existing prior authorization policies and characterized policy components to inform future evaluation efforts. Methods: A 50-state legal assessment characterized ADHD prior authorization policies in state Medicaid programs. We designed a database to capture data on policy characteristics and authorization criteria, including data on age restrictions and fail-first behavior therapy requirements. Results: In 2015, 27 states had Medicaid policies that prevented approval of pediatric ADHD medication payment without additional provider involvement. Seven states required that prescribers indicate whether nonmedication treatments were considered before Medicaid payment for ADHD medication could be approved. Conclusion: Medicaid policies on ADHD medication treatment are diverse; some policies are tied to the diagnosis and treatment guidelines of the American Academy of Pediatrics. Evaluations are needed to determine if certain policy interventions guide families toward the use of behavior therapy as the first-line ADHD treatment for young children.
APA, Harvard, Vancouver, ISO, and other styles
18

Trojer, Thomas, Basel Katt, Ruth Breu, Thomas Schabetsberger, and Richard Mair. "Managing Privacy and Effectiveness of Patient-Administered Authorization Policies." International Journal of Computational Models and Algorithms in Medicine 3, no. 2 (April 2012): 43–62. http://dx.doi.org/10.4018/jcmam.2012040103.

Full text
Abstract:
A central building block of data privacy is the individual right of information self-determination. Following from that when dealing with shared electronic health records (SEHR), citizens, as the identified individuals of such records, have to be enabled to decide what medical data can be used in which way by medical professionals. In this context individual preferences of privacy have to be reflected by authorization policies to control access to personal health data. There are two potential challenges when enabling patient-controlled access control policy authoring: First, an ordinary citizen neither can be considered a security expert, nor does she or he have the expertise to fully understand typical activities and workflows within the health-care domain. Thus, a citizen is not necessarily aware of implications her or his access control settings have with regards to the protection of personal health data. Both privacy of citizen’s health-data and the overall effectiveness of a health-care information system are at risk if inadequate access control settings are in place. This paper refers to scenarios of a case study previously conducted and shows how privacy and information system effectiveness can be defined and evaluated in the context of SEHR. The paper describes an access control policy analysis method which evaluates a patient-administered access control policy by considering the mentioned evaluation criteria.
APA, Harvard, Vancouver, ISO, and other styles
19

Ch. Yarmaki and V. Yarmaki. "POLICE SUPERVISION OF RELEASES FROM PRISON." International Academy Journal Web of Scholar, no. 5(35) (May 31, 2019): 55–58. http://dx.doi.org/10.31435/rsglobal_wos/31052019/6506.

Full text
Abstract:
It is provided the concept and features of police supervision; its correlation with administrative supervision is considered; the supervision of the behavior of previously convicted persons and legal acts regulating its implementation are analyzed. Given the central role of supervision in shaping police agency outcomes, the purpose of this paper is to understand ratings of supervisor performance overall and on several distinct dimensions. The description of the police as the strong arm of the State oversight reflects their authorization to enforce laws and policies defined by State institutions. It is concluded that there is a necessity to amend the Law of Ukraine "On the Administrative Supervision of Releases from Prison", other legal acts regulating the issue of supervision and probation.
APA, Harvard, Vancouver, ISO, and other styles
20

Henderson, Nadine, Phill O'Neill, and Martina Garau. "PP106 Twenty Years Of Orphan Medicines Regulation: Have Treatments Reached Patients In Need Across Europe And Canada?" International Journal of Technology Assessment in Health Care 37, S1 (December 2021): 19. http://dx.doi.org/10.1017/s0266462321001124.

Full text
Abstract:
IntroductionThe European Union regulation for orphan medicinal products (OMPs) was introduced to improve the quality of treatments for patients with rare conditions. To mark 20 years of European Union OMP regulation, this study compared access to OMPs and the length of their reimbursement process in a set of European countries and Canadian provinces. Access refers to their full or partial reimbursement by the public health service.MethodsData were collated on European Medicines Agency orphan designation and marketing authorizations, health technology assessment (HTA) decisions and reimbursement decisions, and the respective dates of these events for all the OMPs centrally authorized in 14 European countries (Belgium, England, France, Germany, Hungary, Italy, the Netherlands, Norway, Poland, Scotland, Slovakia, Spain, Sweden, and Switzerland) and four Canadian provinces (Alberta, British Columbia, Ontario, and Quebec).ResultsSince the implementation of the OMPs Regulation in 2000, 215 OMPs obtained marketing authorization. We found that Germany had the highest level of coverage, with 91 percent of OMPs being reimbursed. The three countries with the lowest reimbursement rates were Poland, Hungary, and Norway (below 30%). We observed that Germany had the quickest time to reimbursement following marketing authorization, followed by Switzerland and Scotland. We observed that Poland, Hungary, and Slovakia consistently had the longest time to reimbursement.ConclusionsWe observed substantial variation in the levels and speed of national reimbursement of OMPs, particularly when comparing countries in Eastern and Western Europe, which suggests that an equity gap between the regions may be present. The data also indicated a trend toward faster times to reimbursement over the past 10 years.
APA, Harvard, Vancouver, ISO, and other styles
21

Rathod, Yagnik A. "An access control and authorization model with Open stack cloud for Smart Grid." ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal 9, no. 3 (November 4, 2020): 69–87. http://dx.doi.org/10.14201/adcaij2020936987.

Full text
Abstract:
In compare to Authentication for identification and relationship of an identity of a user with its task and process within the system, authorization in access control is much anxious about confirming that user and its task in the form of system process, access to the assets of any particular domain is only approved when proven obedient to the identified policies. Access control and authorization is always an area of interest for researchers for enhancing security of critical assets from many decades. Our prime focus and interest is in the field of access control model based on Attribute base access control (ABAC) and with this paper we tried to integrate ABAC with openstack cloud for achieving finer level of granularity in access policies for domain like smart grid. Technical advancement of current era demands that critical infrastructure like traditional electrical grid open ups to the modern information and communication technology to get the benefit in terms of efficiency, scalability, accessibility and transparency for better adaptability in real world. Incorporation of ICT with electric grid makes it possible to do greater level of bi-directional interaction among stake holders like customer, generation units, distribution units and administrations and these leads international organization to contribute for standardization of smart grid concepts and technology so that the realization of smart grid becomes reality. Smart grid is a distributed system of very large scale by its nature and needs to integrate available legacy systems with its own security requirements. Cloud computing proven to be most efficient approach for said requirements and we have identified openstack as our cloud platform. We have integrated ABAC approach with default RBAC approach of openstack and provide a frame work that supports and integrate multiple access control polices in making authorization decisions. Smart grid domain in considered as case study which requires support of multiple access policies (RBAC, ABAC or DAC etc) with our model for access control and authorization.
APA, Harvard, Vancouver, ISO, and other styles
22

Ma, Chen-hua, Guo-dong Lu, and Jiong Qiu. "Conflict detection and resolution for authorization policies in workflow systems." Journal of Zhejiang University-SCIENCE A 10, no. 8 (August 2009): 1082–92. http://dx.doi.org/10.1631/jzus.a0820366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Fischer, Michael A., Hailu Cheng, Sebastian Schneeweiss, Jerry Avorn, and Daniel H. Solomon. "Prior Authorization Policies for Selective Cyclooxygenase-2 Inhibitors in Medicaid." Medical Care 44, no. 7 (July 2006): 658–63. http://dx.doi.org/10.1097/01.mlr.0000218775.04675.fd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Schmid, Ian, Mehmet Burcu, and Julie M. Zito. "Medicaid Prior Authorization Policies for Pediatric Use of Antipsychotic Medications." JAMA 313, no. 9 (March 3, 2015): 966. http://dx.doi.org/10.1001/jama.2015.0763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Patel, Monaliben, Debora S. Bruno, Lauren McCaulley, and Piyush Srivastava. "Decreasing the number of authorization denials in an academic medical oncology practice." Journal of Clinical Oncology 38, no. 29_suppl (October 10, 2020): 212. http://dx.doi.org/10.1200/jco.2020.38.29_suppl.212.

Full text
Abstract:
212 Background: Prior authorizations in medical oncology generate additional work and subsequent stress to providers, contributing to physician burnout. Denials of payments can also impact patient care and lead to loss of revenue for the institution. In 2018, first pass denial rates averaged 8.41% per month at our institution. Imaging/scans denials created the majority of this additional work for providers. We aimed to decrease the monthly first pass denial rate average of oncology scans by 25% by May 31, 2020. Methods: Following the creation of a process map of the current prior authorization process and a cause and effect diagram, we identified many factors that could not be controlled (i.e. Insurance company policies). We subsequently created a priority/pay-off-matrix using factors that we could control. Introducing standardized order template for oncology scans was identified as a high impact and feasible countermeasure. Plan-do-study-act cycles (PDSA) plan was developed using this countermeasure to achieve our aim. PDSA 1 included creating template for order entry, educating the nurse partners and advance practice providers (APPs). PDSA 2 included educating physicians and measuring the compliance rate of the template. PDSA 3 addressed the barriers for compliance and education on resources was provided. PDSA 4 included education of the prior authorization staff and reinforcement of template use. A sustainability plan created consisting of a designated RN liaison for review of peer-to-peer requests for oncology scans. Results: PDSA 1: 100% of the nurse partners and APPs were educated. PDSA2: 80% of physicians were educated and 32.8% compliance rate of template use. PDSA 3: 39.2% compliance. PDSA 4: 95% of the radiology prior authorization staff was educated. While our compliance rate for the standardized order template use did increase, we identified many other opportunities to improve the process. Unfortunately, due to COVID-19 pandemic outbreak, resources have been temporarily allocated to relief efforts and the sustainability plan continues to be a work in progress. Conclusions: Peer to peer requests for imaging/scans following authorization denials consume time and effort of providers contributing to burnout and potentially impacting patient care. While many factors cannot be controlled, standardizing ordering process and educating the involved personnel may decrease the number for peer to peer requests. ASCO’s quality training program process helped our institution identify a provider controlled barrier and helped standardize this approach.
APA, Harvard, Vancouver, ISO, and other styles
26

Sun, Wei, Hui Su, and Hongbing Liu. "Role-Engineering Optimization with Cardinality Constraints and User-Oriented Mutually Exclusive Constraints." Information 10, no. 11 (November 4, 2019): 342. http://dx.doi.org/10.3390/info10110342.

Full text
Abstract:
Role-based access control (RBAC) is one of the most popular access-control mechanisms because of its convenience for management and various security policies, such as cardinality constraints, mutually exclusive constraints, and user-capability constraints. Role-engineering technology is an effective method to construct RBAC systems. However, mining scales are very large, and there are redundancies in the mining results. Furthermore, conventional role-engineering methods not only do not consider more than one cardinality constraint, but also cannot ensure authorization security. To address these issues, this paper proposes a novel method called role-engineering optimization with cardinality constraints and user-oriented mutually exclusive constraints (REO_CCUMEC). First, we convert the basic role mining into a clustering problem, based on the similarities between users and use-partitioning and compression technologies, in order to eliminate redundancies, while maintaining its usability for mining roles. Second, we present three role-optimization problems and the corresponding algorithms for satisfying single or double cardinality constraints. Third, in order to evaluate the performance of authorizations in a role-engineering system, the maximal role assignments are implemented, while satisfying multiple security constraints. The theoretical analyses and experiments demonstrate the accuracy, effectiveness, and efficiency of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
27

Narotama, Indra, and Lathifah Hanim. "Investigation Action Against Children Who Are Circulating Pharmaceuticals Stocks That Does Not Have Permission In Jurisdictions Police Resort (Polres) Kudus." Jurnal Daulat Hukum 2, no. 1 (March 15, 2019): 45. http://dx.doi.org/10.30659/jdh.v2i1.4205.

Full text
Abstract:
This research to know the legal basis for investigation of cases of children who distribute pharmaceutical preparation which does not have a marketing authorization, the implementation of the investigation on the case of children who distribute pharmaceutical preparation which does not have a marketing authorization in the territory of the police station of the Kudus, barriers and solutions in the implementation of the investigation on the case of children who circulate preparations pharmacy that does not have a marketing authorization in the territory of the Kudus Police.The method used is empirical juridical methods. Specifications research used the descriptive analysis. Data was collected by interviewing the parties involved in research, direct observation and recording of documents.The results showed that the basic legal basis for investigation of trafficking cases and abuse of pharmaceutical preparations without a marketing authorization is Act No.36 of 2009 on Health, which sentencing criminal offense trafficking and abuse of pharmaceutical preparations without a marketing authorization provided for in Article 197, it refers to the the provisions of Article 106 paragraph (1) in the form of pharmaceutical preparations and medical devices can only be released after obtaining marketing authorization. The process of investigation of the case of children who distribute pharmaceuticals do not have a marketing authorization in the territory of the Kudus Police have been done by the procedural law in Indonesia, namely the Criminal Code, it is proved to have been implemented procedures Investigators action in the process of investigation. The process of investigation is also under the provisions of Article 189Undang Act No. 36 of 2009 on Health and Act No. 3 of 1997 on Juvenile Court and the provisions of Article 82 of Act No. 23 of 2002 on Child Protection. Barriers faced by investigators Kudus Police in carrying out investigation on the case of children who distribute pharmaceuticals do not have a marketing authorization in the jurisdiction of the Kudus Police is limited both the quantity and quality of human resources of law enforcement officers who understand the case for children, operating costs, low awareness of the witness in attending the examination process, the lack of legal awareness of the society and time specified in the investigation of cases children are very little, while filing must be submitted as soon as possible.Keywords: Investigation; Children; Pharmacy Circulation Without Permission.
APA, Harvard, Vancouver, ISO, and other styles
28

Giglione, Giada, Anna Annibaldi, Antonio Iaccarino, Roberto Capancioni, Giorgio Borghini, Fiorenzo Ciabattoni, Silvia Illuminati, Giandomenico Pace, Francesco Memmola, and Gianni Giantomassi. "An Integrated Web-Based GIS Platform for the Environmental Monitoring of Industrial Emissions: Preliminary Results of the Project." Applied Sciences 12, no. 7 (March 25, 2022): 3369. http://dx.doi.org/10.3390/app12073369.

Full text
Abstract:
The European regulatory framework requires prior authorization for the use of plants and activities that may impact the environment, to ensure an adequate level of environmental and human health protection. Data on industrial wastewater, urban sewage, atmospheric emissions and waste management of installations subject to licenses generate interest among stakeholders (Environmental Protection Agencies, Police Forces, regions, provinces, municipalities, Local Health Authorities, operators, research bodies, citizens), but unfortunately, they are not properly digitized and processed, as they are often unavailable. Therefore, the main goal of this project is to provide a flexible, interactive and easy-to-use tool for stakeholders to allow them to consult these kinds of environmental data. For this purpose, a database integrated with a web-based Geographical Information System (GIS) platform to collect, manage and share pollutant emissions data, is currently being designed and developed. The web platform offers to users interconnected informative modules on required authorizations, license processes and analytical controls. Moreover, stored data from industries and on emissions are georeferenced and displayed in a web GIS map. Stakeholders have free but limited access to specific sections of the web platform, depending on their tasks. They can consult environmental data and GIS representations, download reports or documents and enter new data. This web application seeks to: (1) promote collaboration among stakeholders, (2) simplify the monitoring of an installation’s authorization status and industrial emissions trends, (3) optimize the environmental licensing procedures, (4) enhance the management of environmental control by the relevant authorities, (5) support health and environmental research, and (6) provide industries with innovative services for data transmission. To evaluate the performance and benefits of the newly-developed tool, a real-life pilot case has been applied using data from industries located in the Province of Ascoli Piceno (Marche region, Italy).
APA, Harvard, Vancouver, ISO, and other styles
29

Naci, Huseyin, Robin Forrest, Mike Zhai, Amanda R. Stofesky, and Aaron S. Kesselheim. "Characteristics of Prior Authorization Policies for New Drugs in Medicare Part D." JAMA Health Forum 4, no. 2 (February 24, 2023): e225610. http://dx.doi.org/10.1001/jamahealthforum.2022.5610.

Full text
Abstract:
This cross-sectional study examines the characteristics of prior authorization policies for new drugs in Medicare Part D to understand whether they are consistent with US Food and Drug Administration indications.
APA, Harvard, Vancouver, ISO, and other styles
30

Bai, Yun, and Khaled M. Khan. "Ell Secure Information System Using Modal Logic Technique." International Journal of Secure Software Engineering 2, no. 2 (April 2011): 65–76. http://dx.doi.org/10.4018/jsse.2011040104.

Full text
Abstract:
In this paper, the authors propose a formal logic technique to protect information systems. As the widespread use of computer systems grows, the security of the information stored in such systems has become more important. As a security mechanism, authorization or access control ensures that all accesses to the system resources occur exclusively according to the access polices and rules specified by the system security agent. Authorization specification has been widely studied and a variety of approaches have been investigated. The authors propose a formal language with modal logic to specify the system security policies. The authors also provide the reasoning in response to system access requests, especially in situations where the security agent’s knowledge base is incomplete. The semantics of this language is provided by translating it into epistemic logic program in which knowledge related modal operators are employed to represent agents’ knowledge in reasoning. The authors demonstrate how this approach handles the situation where the security agent’s knowledge on access decision is incomplete. The proposed mechanism effectively prevents unauthorized and malicious access to information systems.
APA, Harvard, Vancouver, ISO, and other styles
31

Henry, Kevin Lawrence. "Heretical Discourses in Post-Katrina Charter School Applications." American Educational Research Journal 56, no. 6 (June 19, 2019): 2609–43. http://dx.doi.org/10.3102/0002831219853811.

Full text
Abstract:
Using New Orleans as a site of analysis, this article provides a critical race theory reading of a little studied policy mechanism, the charter school application and authorization process. Embedded and competing narratives within charter school applications are analyzed. The authorization process is the central gatekeeping mechanism in the reproduction of charter schools. The authorization process determines who gets to govern schools, including the freedom to set curriculum, discipline policies, personnel, utilization of funds, and their relationship to and role in the communities in which they are located. This article unpacks the community based and “no excuses” discourses within charter applications. It finds patterns of confluence between those narratives and the applicants’ racial and educational identities, suggesting that the authorization process worked as a site for the reproduction of racialized neoliberal dominance in post-Katrina New Orleans, disenfranchising local teachers and communities.
APA, Harvard, Vancouver, ISO, and other styles
32

Li, Biao, Yong Geng, Xiqiang Xia, Dan Qiao, and Hao Wang. "Comparatively Analyzing the Impact of Government Subsidy and Carbon Tax Policy on Authorized Remanufacturing." International Journal of Environmental Research and Public Health 18, no. 16 (August 5, 2021): 8293. http://dx.doi.org/10.3390/ijerph18168293.

Full text
Abstract:
Authorized remanufacturing is an important means to achieve green manufacturing and carbon neutrality. In this study, a game theory model between a manufacturer and a remanufacturer was constructed to analyze the impact of government subsidies and carbon tax policies on authorized remanufacturing. Based on the game theory model, the effects of two government policies on the optimal solution, namely, the unit cost of remanufacturing product authorization and the waste product recovery rate, were compared and analyzed. This analysis could provide a reference for the government to improve and formulate relevant remanufacturing policies. The main results are as follows: government subsidy policies may increase the unit cost of remanufacturing product authorization and the rates of waste product recovery; government carbon tax policies may not affect the unit cost of remanufacturing product authorization, and increase the rates of waste product recovery; the government subsidy policy may not affect the unit retail price of new products, and reduces the unit retail price of remanufactured products; the government subsidy and carbon tax policies may reduce sales of new products and increase sales of remanufactured products; the government subsidies may increase the revenue of the original equipment manufacturer (OEM) and the remanufacturer; and the government carbon tax policies may increase the revenue of the remanufacturer. However, government carbon tax policies increase the revenue of the OEM only when the new product carbon tax amount is higher than a certain threshold. The impact of the two policies on the environment is related to the ratio of the two products’ impact on the environment, i.e., the quota ratio between the unit government carbon tax of the new product and the unit government subsidy of the remanufactured product. Finally, the consumer surplus is maximized when the government adopts the subsidy policy and lowest when the government adopts the carbon tax policy.
APA, Harvard, Vancouver, ISO, and other styles
33

Gonzalez, Richard, Firouzan “Fred” Massoomi, and William Neff. "Emergency-use authorization of peramivir." American Journal of Health-System Pharmacy 66, no. 24 (December 15, 2009): 2162–63. http://dx.doi.org/10.2146/ajhp090584.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Mahar, Uzma, Muhammad Aleem, and Ehtesham Zahoor. "TTECCDU: a blockchain-based approach for expressive authorization management." PeerJ Computer Science 9 (February 20, 2023): e1212. http://dx.doi.org/10.7717/peerj-cs.1212.

Full text
Abstract:
Authorization uses the access control policies to allow or limit a user the access to a resource. Blockchain-based access control models are used to manage authorization in a decentralized way. Many approaches exist that have provided the distributed access control frameworks which are user driven, transparent and provide fairness with its distributed architecture. Some approaches have used authorization tokens as access control mechanisms and mostly have used smart contracts for the authorization process. The problem is that most of the approaches rely on a single authorization factor like either trust or temporal; however, none has considered other important factors like cost, cardinality, or usage constraints of a resource making the existing approaches less expressive and coarse-grained. Also, the approaches using smart contracts are either complex in design or have high gas cost. To the best of our knowledge, there is no approach that uses all the important authorization factors in a unified framework. In this article, we present an authorization framework: TTECCDU that consists of multi-access control models i.e., trust-based, cost-based, temporal-based, cardinality-based, and usage-based to provide strong and expressive authorization mechanism. TTECCDU also handles the delegation context for authorization decisions. The proposed framework is implemented using smart contracts which are written in a modular form so that they are easily manageable and can be re-deployed when needed. Performance evaluation results show that our smart contracts are written in an optimized manner which consume 60.4% less gas cost when the trust-based access is compared and 59.2% less gas cost when other proposed smart contracts from our approach are compared to the existing approaches.
APA, Harvard, Vancouver, ISO, and other styles
35

Hunter, Grace, Jennifer Schneider, and Sophie Pinkard. "Prior Authorization And Overuse Of Imaging." Health Affairs 31, no. 12 (December 2012): 2830. http://dx.doi.org/10.1377/hlthaff.2012.1236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Henry, Kevin Lawrence. "“The Price of Disaster”: The Charter School Authorization Process in Post-Katrina New Orleans." Educational Policy 35, no. 2 (February 23, 2021): 235–58. http://dx.doi.org/10.1177/0895904820988202.

Full text
Abstract:
Charter schools because of their entanglements with privatization remain one of the most publicly contested and controversial educational reform initiatives. Charter schools, in theory, are to balance autonomy and accountability in order to provide students with innovative learning environments and increased achievement on traditional academic measures. The governance of charter schools and the vision espoused in the charter application are central in determining the organization and operation of charter schools. As such, connected to charter schools are the actors that envision them and the processes and policies that enable them. Utilizing the case of post-Katrina New Orleans, I examine the charter authorization process, an understudied aspect of charter school policy. Understood as an objective, colorblind process in mainstream policy articulations, the authorization process regulates entry into educational markets. This paper applies a Critical Race Theory analysis to the authorization process. I argue the charter school authorization process is a foundational gatekeeping mechanism that structures charter markets. In so doing, the charter school authorization process is embedded within and constitutive of on-going processes of racial formation and racialized power solidification. Moreover, I argue mainstream policy articulations situate the charter school authorization process as an accountability mechanism that is neutral, benign, and objective; such articulations distort and distract from the racial antagonisms upon which neoliberal reform projects are built.
APA, Harvard, Vancouver, ISO, and other styles
37

Hulaj, Murat. "General Tasks and Authorizations of Poice Inpreliminary Procedure in Kosova." European Journal of Social Sciences Education and Research 2, no. 1 (December 30, 2014): 286. http://dx.doi.org/10.26417/ejser.v2i1.p286-290.

Full text
Abstract:
The aim of this paper is to reflect the role of Police in preliminary procedure taking into consideration differences in judicial-criminal system of Kosovo, referring in particularity: Investigating role of police in preliminary procedure; Acts that should be undertaken pursuant law authorizations in case of criminal acts; Detaining of persons who are found at the scene of incident; Control foe scene of incident and police security; Informing of suspects toward their rights and finally; Drafting of penal indictment. We are witnesses of the practice toward collecting of acts not as stipulated by the law which cause later problems in the following procedures of Prosecutor and the Courts due to defining and verifying of criminal acts truth.
APA, Harvard, Vancouver, ISO, and other styles
38

BAI, YUN, and YAN ZHANG. "ARTIFICIAL INTELLIGENCE IN DATABASE SECURITY." International Journal of Pattern Recognition and Artificial Intelligence 18, no. 01 (February 2004): 3–17. http://dx.doi.org/10.1142/s0218001404003022.

Full text
Abstract:
In this paper, we propose a formal approach of Artificial Intelligence (AI) in securing object oriented database systems. We combine the specification of object oriented database with security policies and provide its formal syntax and semantics. The properties in the inheritance of authorizations in object oriented database system and reasoning about authorizations on data objects are also investigated in detail.
APA, Harvard, Vancouver, ISO, and other styles
39

Elrakaiby, Yehia, Frédéric Cuppens, and Nora Cuppens-Boulahia. "An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations." International Journal of Mobile Computing and Multimedia Communications 3, no. 2 (April 2011): 33–51. http://dx.doi.org/10.4018/jmcmc.2011040103.

Full text
Abstract:
Pre-obligations denote actions that may be required before access is granted. The successful fulfillment of pre-obligations leads to the authorization of the requested access. Pre-obligations enable a more flexible enforcement of authorization policies. This paper formalizes interactions between the obligation and authorization policy states when pre-obligations are supported and investigates their use in a practical scenario. The main advantage of the presented approach is that it gives pre-obligations both declarative semantics using predicate logic and operational semantics using Event-Condition-Action (ECA) rules. Furthermore, the presented framework enables policy designers to easily choose to evaluate any pre-obligation either (1) statically (an access request is denied if the pre-obligation has not been fulfilled); or (2) dynamically (users are given the possibility to fulfill the pre-obligation after the access request and before access is authorized).
APA, Harvard, Vancouver, ISO, and other styles
40

LU, Jianfeng, Ruixuan LI, Jinwei HU, and Dewu XU. "Static Enforcement of Static Separation-of-Duty Policies in Usage Control Authorization Models." IEICE Transactions on Communications E95.B, no. 5 (2012): 1508–18. http://dx.doi.org/10.1587/transcom.e95.b.1508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Stokan, Eric J. "Accounting for State Authorization in Local Economic Development Policy Usage." State and Local Government Review 50, no. 1 (October 5, 2017): 24–36. http://dx.doi.org/10.1177/0160323x17728780.

Full text
Abstract:
This article empirically tests the impact of failing to account for state-level authorization when explaining the factors that lead municipalities to use tax abatements, tax increment financing, and enterprise zones. Although existing research implicitly assumes that state-level authorization exists, this article demonstrates that this unfounded assumption leads to biased estimates using the 1999, 2004, and 2009 International City/County Management Association (ICMA) Economic Development Survey data on a nationwide set of municipalities. This article refines what is known about the factors, leading to the usage of these three policies before offering implications for practitioners and researchers of local economic development.
APA, Harvard, Vancouver, ISO, and other styles
42

Luong, Thanh-Nhan, Hanh-Phuc Nguyen, and Ninh-Thuan Truong. "VeRA: Verifying RBAC and Authorization Constraints Models of Web Applications." International Journal of Software Engineering and Knowledge Engineering 31, no. 05 (May 2021): 655–75. http://dx.doi.org/10.1142/s0218194021500182.

Full text
Abstract:
The software security issue is being paid great attention from the software development community as security violations have emerged variously. Developers often use access control techniques to restrict some security breaches to software systems’ resources. The addition of authorization constraints to the role-based access control model increases the ability to express access rules in real-world problems. However, the complexity of combining components, libraries and programming languages during the implementation stage of web systems’ access control policies may arise potential flaws that make applications’ access control policies inconsistent with their specifications. In this paper, we introduce an approach to review the implementation of these models in web applications written by Java EE according to the MVC architecture under the support of the Spring Security framework. The approach can help developers in detecting flaws in the assignment implementation process of the models. First, the approach focuses on extracting the information about users and roles from the database of the web application. We then analyze policy configuration files to establish the access analysis tree of the application. Next, algorithms are introduced to validate the correctness of the implemented user-role and role-permission assignments in the application system. Lastly, we developed a tool called VeRA, to automatically support the verification process. The tool is also experimented with a number of access violation scenarios in the medical record management system.
APA, Harvard, Vancouver, ISO, and other styles
43

Forrester, Caroline. "Benefits of Prior Authorizations." Journal of Managed Care & Specialty Pharmacy 26, no. 7 (July 2020): 820–22. http://dx.doi.org/10.18553/jmcp.2020.26.7.820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Rosenson, Beth A. "Against Their Apparent Self-Interest: The Authorization of Independent State Legislative Ethics Commissions, 1973–96." State Politics & Policy Quarterly 3, no. 1 (March 2003): 42–65. http://dx.doi.org/10.1177/153244000300300103.

Full text
Abstract:
Why do state legislators enact policies that conflict with their immediate self-interest? I address this question by assessing the impact of traditional and non-traditional policy determinants on ethics policy adoption. Specifically, I use event history analysis to identify the factors that explain the authorization of independent state legislative ethics commissions from 1973 to 1996. I find that the determinants of ethics policy are substantially, but not completely, different from those of other policies, with ethics policy fitting into an agenda-setting model better than many other policies. Scandals and the actions of other states played a prominent role in setting the agenda and facilitating the authorization of ethics commissions. The agenda-setting process transforms the immediate self-interest of legislators on this issue from one of concern about their own economic well being to one of concern about re-election. In addition, political culture, institutional power arrangements, legislative compensation, and party competition had small but discernible effects on the likelihood of a state establishing a legislative ethics commission.
APA, Harvard, Vancouver, ISO, and other styles
45

Zhang, Ai Juan, Cheng Ji, and Jian Wang. "Security Policy Conflict Detection for Distributed System." Advanced Materials Research 282-283 (July 2011): 173–76. http://dx.doi.org/10.4028/www.scientific.net/amr.282-283.173.

Full text
Abstract:
Distributed applications require integrating security policies of collaborating parties, and the policies must be able to support complex authorization specifications and conflicts of policies must be able to be detected. In this paper, we introduce a policy for fine-grained access control which is able to support the specifications with sufficient policy constraints, and then we present a methodology based on semantics to detect whether there are policy conflicts and then produce the XACML policy document.
APA, Harvard, Vancouver, ISO, and other styles
46

Balaban, Edward P. "Prior Authorization: This Will Take Time." Journal of Oncology Practice 14, no. 8 (August 2018): 455–56. http://dx.doi.org/10.1200/jop.18.00303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Newcomer, Lee N., Richard Weininger, and Robert W. Carlson. "Transforming Prior Authorization to Decision Support." Journal of Oncology Practice 13, no. 1 (January 2017): e57-e61. http://dx.doi.org/10.1200/jop.2016.015198.

Full text
Abstract:
Purpose: To evaluate a computer-based prior authorization system that was designed to include and test two new concepts for physician review: (1) the tool would minimize denials by providing real-time decision support with alternative options if the original request was noncompliant, and (2) the tool would collect sufficient information to create a patient registry. Methods: A new prior authorization tool incorporating real-time decision support was tested with a large national payer. The tool used the National Comprehensive Cancer Network Clinical Practice Guidelines in Oncology as the content for decision making. Physicians were asked to submit the minimal amount of clinical data necessary to reach a treatment-decision node within the National Comprehensive Cancer Network Guidelines. To minimize denials, all available recommended treatments were displayed for physician consideration and immediate authorization was granted for any compliant selection. Results: During a 1-year pilot in a Florida commercial health plan, 4,272 eligible cases were reviewed with only 42 denials. Chemotherapy drug costs for the prior authorization pilot were compared with a similar time period in the previous year for the state of Florida, as well as for the Southeast region and for the nation, which served as controls. The percentage change between the time periods was −9% in Florida, 10% for the national costs, and 11% for the Southeast region costs. The difference between the regional increase and the Florida decrease represented a savings of $5.3 million dollars for the state of Florida in 1 year. Conclusion: There is significant opportunity to reduce the costs of therapy while being compliant with nationally accepted guidelines for cancer chemotherapy.
APA, Harvard, Vancouver, ISO, and other styles
48

Pinilla-Dominguez, Pilar, Huseyin Naci, Leeza Osipenko, and Elias Mossialos. "NICE's evaluations of medicines authorized by EMA with conditional marketing authorization or under exceptional circumstances." International Journal of Technology Assessment in Health Care 36, no. 4 (June 25, 2020): 426–33. http://dx.doi.org/10.1017/s0266462320000355.

Full text
Abstract:
ObjectivesTo investigate the impact of the uncertainty stemming from products with European conditional marketing authorization (CMA) or authorization in exceptional circumstances (AEC) on the National Institute for Health and Care Excellence's (NICE) recommendations.MethodsProducts which received CMA/AEC by European Medicines Agency (EMA) up to 1 December 2016 were identified and matched with corresponding NICE decisions issued by August 2017, the status of which was then traced to August 2019. We assessed whether the conversion of CMA to full marketing authorization triggered a review of a NICE decision. The odds of a recommendation carrying a commercial arrangement for products with and without CMA/AEC were calculated.ResultsFifty-four products were granted CMA/AEC by EMA. NICE conducted thirty evaluations of products with CMA/AEC. Twelve products were recommended by NICE by August 2017 and fourteen by August 2019. All recommendations had an associated commercial arrangement. The odds of carrying a commercial arrangement were higher for products with CMA/AEC compared to those with full authorization. Conversions from conditional to full authorization among products not recommended by NICE did not trigger an appraisal review.ConclusionsUncertainty, stemming from the lack of robust clinical data of products authorized with CMA/AEC, has a substantial impact on HTA recommendations, frequently requiring risk mitigation mechanisms such as commercial and data collection arrangements. Further analyses should be conducted to assess whether the benefits of early access strategies outweigh the risks for patients and the healthcare system.
APA, Harvard, Vancouver, ISO, and other styles
49

Abraham, Amanda J., Christina M. Andrews, Samantha J. Harris, Melissa M. Westlake, and Colleen M. Grogan. "Coverage and Prior Authorization Policies for Medications for Opioid Use Disorder in Medicaid Managed Care." JAMA Health Forum 3, no. 11 (November 4, 2022): e224001. http://dx.doi.org/10.1001/jamahealthforum.2022.4001.

Full text
Abstract:
ImportanceMedicaid is a key policy lever to improve opioid use disorder treatment, covering approximately 40% of Americans with opioid use disorder. Although approximately 70% of Medicaid beneficiaries are enrolled in comprehensive managed care organization (MCO) plans, little is known about coverage and prior authorization (PA) policies for medications for opioid use disorder (MOUD) in these plans.ObjectiveTo compare coverage and PA policies for buprenorphine, methadone, and injectable naltrexone across Medicaid MCO plans and fee-for-service (FFS) programs and across states.Design, Setting, and ParticipantsThis cross-sectional study analyzed MOUD data from 266 Medicaid MCO plans and FFS programs in 38 states and the District of Columbia in 2018.Main Outcomes and MeasuresFor each medication, the percentages of MCO plans and FFS programs that covered the medication without PA, covered the medication with PA, and did not cover the medication were calculated, as were the percentages of MCO, FFS, and all (MCO and FFS) beneficiaries who were covered with no PA, covered with PA, and not covered. In addition, MCO plan coverage and PA policies were mapped by state. Analyses were conducted from January 1 through May 31, 2022.ResultsCoverage and PA policies were compared for MOUD in 266 MCO plans and 39 FFS programs, representing approximately 70 million Medicaid beneficiaries. Overall, FFS programs had more generous MOUD coverage than MCO plans. However, a higher percentage of FFS programs imposed PA for the 3 medications (47.0%) than did MCOs (35.9%). Furthermore, although most Medicaid beneficiaries were enrolled in a plan that covered MOUD, 53.2% of all MCO- and FFS-enrolled beneficiaries were subject to PA. Results also showed wide state variation in MCO plan coverage and PA policies for MOUD and the percentage of Medicaid beneficiaries subject to PA.Conclusions and RelevanceThis cross-sectional study found variation in MOUD coverage and PA policies across Medicaid MCO plans and FFS programs and across states. Thus, Medicaid beneficiaries’ access to MOUD may be heavily influenced by their state of residency and the Medicaid plan in which they are enrolled. Left unaddressed, PA policies are likely to remain a barrier to MOUD access in the nation’s Medicaid programs.
APA, Harvard, Vancouver, ISO, and other styles
50

Abouzaid, Safiya, Eric Jutkowitz, Kathy A. Foley, Laura T. Pizzi, Edward Kim, and Jay Bates. "Economic Impact of Prior Authorization Policies for Atypical Antipsychotics in the Treatment of Schizophrenia." Population Health Management 13, no. 5 (October 2010): 247–54. http://dx.doi.org/10.1089/pop.2009.0063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography