메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1-6

Rendezvous-based access control for medical records in the pre-hospital environment

Author keywords

Aggregation threat; Capabilities; Electronic health records; Pre hospital environment; Security model

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; DATA STRUCTURES; INFORMATION MANAGEMENT; MEDICAL COMPUTING; SOFTWARE DESIGN;

EID: 35549010677     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1248054.1248057     Document Type: Conference Paper
Times cited : (15)

References (18)
  • 2
    • 84970850862 scopus 로고
    • NHS-wide networking and patient confidentiality
    • R. J. Anderson. NHS-wide networking and patient confidentiality. BMJ, 311(6996):5-6, 1995.
    • (1995) BMJ , vol.311 , Issue.6996 , pp. 5-6
    • Anderson, R.J.1
  • 3
    • 0030028303 scopus 로고    scopus 로고
    • Clinical system security: Interim guidelines
    • R. J. Anderson. Clinical system security: interim guidelines. BMJ, 312(7023):109-111, 1996.
    • (1996) BMJ , vol.312 , Issue.7023 , pp. 109-111
    • Anderson, R.J.1
  • 5
    • 35548933972 scopus 로고    scopus 로고
    • T. Beale, S. Heard, D. Kalra, and D. Lloyd. openEHR Architecture Overview. http://www.openEHR.org, Mar 2006.
    • T. Beale, S. Heard, D. Kalra, and D. Lloyd. openEHR Architecture Overview. http://www.openEHR.org, Mar 2006.
  • 6
    • 0022114934 scopus 로고
    • Consistency in a partitioned network: A survey
    • S. B. Davidson, H. Garcia-Molina, and D. Skeen. Consistency in a partitioned network: a survey. ACM Comput. Surv., 17(3):341-370, 1985.
    • (1985) ACM Comput. Surv , vol.17 , Issue.3 , pp. 341-370
    • Davidson, S.B.1    Garcia-Molina, H.2    Skeen, D.3
  • 7
    • 33846576210 scopus 로고    scopus 로고
    • Audit-based access control for electronic health records
    • M. A. C. Dekker and S. Etalle. Audit-based access control for electronic health records. Electron. Notes Theor. Comput. Sci., 168:221-236, 2007.
    • (2007) Electron. Notes Theor. Comput. Sci , vol.168 , pp. 221-236
    • Dekker, M.A.C.1    Etalle, S.2
  • 8
    • 0000338326 scopus 로고
    • Programming semantics for multiprogrammed computations
    • Mar
    • J. Dennis and E. V. Horn. Programming semantics for multiprogrammed computations. Communications of the ACM, 9(3):143-155, Mar. 1966.
    • (1966) Communications of the ACM , vol.9 , Issue.3 , pp. 143-155
    • Dennis, J.1    Horn, E.V.2
  • 9
    • 0012296562 scopus 로고
    • Department of Defense, Department of defense (DoD) trusted computer system evaluation criteria TCSEC
    • Department of Defense. DoD 5200.28-STD: Department of defense (DoD) trusted computer system evaluation criteria (TCSEC), 1985.
    • (1985) DoD 5200.28-STD
  • 10
    • 33745176972 scopus 로고    scopus 로고
    • A survey and analysis of electronic healthcare record standards
    • M. Eichelberg, T. Aden, J. Riesmeier, A. Dogac, and G. B. Laleci. A survey and analysis of electronic healthcare record standards. ACM Comput. Surv., 37(4):277-315, 2005.
    • (2005) ACM Comput. Surv , vol.37 , Issue.4 , pp. 277-315
    • Eichelberg, M.1    Aden, T.2    Riesmeier, J.3    Dogac, A.4    Laleci, G.B.5
  • 11
    • 33745183324 scopus 로고    scopus 로고
    • HIT and MIS: Implications of health information technology and medical information systems
    • P. G. Goldschmidt. HIT and MIS: implications of health information technology and medical information systems. Commun. ACM, 48(10):68-74, 2005.
    • (2005) Commun. ACM , vol.48 , Issue.10 , pp. 68-74
    • Goldschmidt, P.G.1
  • 13
    • 35548999899 scopus 로고    scopus 로고
    • B. Lampson. Protection. In Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems, pages 437-443, Princeton University, Mar. 1971. Reprinted in ACM Operating Systems Review, 8, 1, January 1974, pp. 18-24.
    • B. Lampson. Protection. In Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems, pages 437-443, Princeton University, Mar. 1971. Reprinted in ACM Operating Systems Review, 8, 1, January 1974, pp. 18-24.
  • 14
  • 16
    • 84953635000 scopus 로고
    • Description of a new variable-length key, 64-bit block cipher (blowfish)
    • London, UK, Springer-Verlag
    • B. Schneier. Description of a new variable-length key, 64-bit block cipher (blowfish). In Fast Software Encryption, Cambridge Security Workshop, pages 191-204, London, UK, 1994. Springer-Verlag.
    • (1994) Fast Software Encryption, Cambridge Security Workshop , pp. 191-204
    • Schneier, B.1
  • 18
    • 0003744395 scopus 로고
    • The Cambridge CAP computer and its operating system
    • Elsevier, North Holland
    • M. Wilkes and R. Needham. The Cambridge CAP computer and its operating system. Operating and Programming System Series. Elsevier, North Holland, 1979.
    • (1979) Operating and Programming System Series
    • Wilkes, M.1    Needham, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.