메뉴 건너뛰기




Volumn 5, Issue 1, 2007, Pages 134-144

Implementation of security policy for clinical information systems over wireless sensor networks

Author keywords

Bluetooth; Healthcare information systems; IEEE 802.15.4; Security policy; Wireless sensor networks

Indexed keywords

BLUETOOTH; HEALTHCARE INFORMATION SYSTEMS; SECURITY POLICY; WIRELESS SENSOR NETWORKS;

EID: 33750030809     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2006.05.008     Document Type: Article
Times cited : (38)

References (20)
  • 1
    • 0029697680 scopus 로고    scopus 로고
    • R. Anderson, A security policy model for clinical information systems, in: Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996, pp. 34-48.
  • 3
    • 33750006400 scopus 로고    scopus 로고
    • Bluetooth SIG, Core Specification of the Bluetooth System. Version 2.0 + EDR, November 2004.
  • 5
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31 4 (1985) 469-472
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 6
    • 0036282473 scopus 로고    scopus 로고
    • O. Elkeelany, M.M. Matalgah, K.P. Sheikh, M. Thaker, G. Chaudhry, D. Medhi, et al., Performance analysis of IPSec protocol: encryption and authentication, in: Proceedings of IEEE International Conference on Communications ICC 2002, vol. 2, 2002, pp. 1164-1168.
  • 8
    • 33646492430 scopus 로고
    • Cryptographic protection of databases and software
    • Feigenbaum J., and Merritt M. (Eds), American Mathematical Society, Providence, RI
    • Feigenbaum J., Liberman M., and Wright R.N. Cryptographic protection of databases and software. In: Feigenbaum J., and Merritt M. (Eds). Distributed Computing and Cryptography (1991), American Mathematical Society, Providence, RI 161-172
    • (1991) Distributed Computing and Cryptography , pp. 161-172
    • Feigenbaum, J.1    Liberman, M.2    Wright, R.N.3
  • 10
    • 33750009955 scopus 로고    scopus 로고
    • IEEE. Standard for part 15.4: Wireless MAC and PHY specifications for low rate WPAN. IEEE Std 802.15.4, IEEE, New York, NY, October 2003.
  • 11
    • 33750003516 scopus 로고    scopus 로고
    • R. Merkle, A digital signature based on a conventional encryption function, in: Proceedings of the Advances in Cryptology-CRYPTO '87, 1998, pp. 369-378.
  • 12
    • 84969346266 scopus 로고    scopus 로고
    • R. Merkle, A certified digital signature, in: Proceedings of the Advances in Cryptology-CRYPTO '88, 1990, pp. 218-238.
  • 13
    • 33750032811 scopus 로고    scopus 로고
    • R. Merkle, Method of providing digital signatures. US patent # 4,309,569, January 5, 1982.
  • 15
    • 33750297757 scopus 로고    scopus 로고
    • V.B. Mišić, J. Fung, J. Mišić. MAC layer security of 802.15.4-compliant networks, in: Proceedings of the WSNS'05, held in conjunction with IEEE MASS05 2005, Washington, DC, December 2005.
  • 17
    • 33749999070 scopus 로고    scopus 로고
    • National Institute of Standards. Digital Signature Standard. Gaithersburg, MD: US Department of Commerce, 1994.
  • 20
    • 0034440924 scopus 로고    scopus 로고
    • S. Zürbes, Considerations on link and system throughput of Bluetooth networks, in: Proceedings of the 11th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications PIMRC 2000, vol. 2, London, UK, September 2000, pp. 1315-1319.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.