메뉴 건너뛰기




Volumn , Issue , 2008, Pages 122-130

Security and privacy system architecture for an e-hospital environment

Author keywords

Authentication; Health care; Policy based encryption; Privacy

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; COMPUTER APPLICATIONS; DECISION SUPPORT SYSTEMS; HEALTH; HEALTH CARE; HOSPITALS; INTERNET; MEDICAL COMPUTING; SECURITY SYSTEMS; TECHNOLOGY TRANSFER;

EID: 57749102657     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1373290.1373306     Document Type: Conference Paper
Times cited : (27)

References (20)
  • 2
    • 57749096981 scopus 로고    scopus 로고
    • Array Networks Inc. SSL VPN vs IPSec VPN, Jan. 2003. white paper.
    • Array Networks Inc. SSL VPN vs IPSec VPN, Jan. 2003. white paper.
  • 3
    • 26444464784 scopus 로고    scopus 로고
    • Policy-Based Cryptography and Applications
    • Springer Berlin, Heidelberg
    • W Bagga and R Molva, "Policy-Based Cryptography and Applications", In Lecture Notes in Computer Science, pp. 72-87, Springer Berlin / Heidelberg, 2005.
    • (2005) Lecture Notes in Computer Science , pp. 72-87
    • Bagga, W.1    Molva, R.2
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Springer-Verlag
    • D Boneh and M Franklin, "Identity-Based Encryption from the Weil Pairing", In Proceedings of CRYPTO 2001, pages 213-229, Springer-Verlag, 2001.
    • (2001) Proceedings of CRYPTO , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 10
    • 7244238418 scopus 로고    scopus 로고
    • Virtual Private Networks: An Overview with Performance Evaluation
    • October
    • S Khanvilkar, A Khokhar, "Virtual Private Networks: An Overview with Performance Evaluation", IEEE Communications Magazine, pp 146-154, October 2004.
    • (2004) IEEE Communications Magazine , pp. 146-154
    • Khanvilkar, S.1    Khokhar, A.2
  • 13
    • 57749092754 scopus 로고    scopus 로고
    • Motion Computing, Motion C5, 2007, http://www. motioncomputing.com/
    • Motion Computing, "Motion C5", 2007, http://www. motioncomputing.com/
  • 14
    • 57749106429 scopus 로고    scopus 로고
    • Personal Health Information Protection Act (PHIPA 2004) http://www.health.gov.on.ca/english/public/legislation/bill-31/personal-info. html
    • Personal Health Information Protection Act (PHIPA 2004) http://www.health.gov.on.ca/english/public/legislation/bill-31/personal-info. html
  • 15
    • 57749094685 scopus 로고    scopus 로고
    • Personal Information Protection and Electronic Documents Act (PIPEDA 2000) http://www.privcom.gc.ca/legislation/02-06-01-01-e.asp
    • Personal Information Protection and Electronic Documents Act (PIPEDA 2000) http://www.privcom.gc.ca/legislation/02-06-01-01-e.asp
  • 16
    • 67349246661 scopus 로고    scopus 로고
    • Secure Computing, 2007, http://www.securecomputing.com/
    • (2007) Secure Computing
  • 17
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer-Verlag New York, Inc
    • Shamir, "Identity-based cryptosystems and signature schemes", In Proceedings of CRYPTO 84 on Advances in cryptology, pp. 47-53. Springer-Verlag New York, Inc., 1985.
    • (1985) Proceedings of CRYPTO 84 on Advances in cryptology , pp. 47-53
    • Shamir1
  • 18
    • 35248891001 scopus 로고    scopus 로고
    • Access control using pairing based cryptography
    • Proceedings CT-RSA, Springer-Verlag, April
    • N Smart. "Access control using pairing based cryptography", In Proceedings CT-RSA 2003, pp 111-121. Springer-Verlag LNCS 2612, April 2003.
    • (2003) LNCS , vol.2612 , pp. 111-121
    • Smart, N.1
  • 20
    • 57749089503 scopus 로고    scopus 로고
    • Voltage, http://www.voltage.com
    • Voltage


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.