-
1
-
-
51449113287
-
Consumer-centric and Privacy-preserving Identity Management for Distributed E-health Systems
-
Au, R. and Croll, P. (2008), "Consumer-centric and privacy-preserving identity management for distributed e-health systems", Proceedings of 41st Hawaii International Conference on Systems Science (HICSS-41 2008), IEEE Computer Society, p. 234.
-
(2008)
Proceedings of 41st Hawaii International Conference on Systems Science (HICSS-41 2008), IEEE Computer Society
, pp. 234
-
-
Au, R.1
Croll, P.2
-
2
-
-
70249140684
-
-
AJAX available at
-
AJAX (2006), "Ajax at the open directory project", available at: http://dmoz.org/Computers/ Programming/Languages/JavaScript/AJAX
-
(2006)
Ajax at the Open Directory Project
-
-
-
3
-
-
70249098230
-
-
available at
-
BeHealth (2006), "BeHealth", available at: www.behealth.be/
-
(2006)
BeHealth
-
-
-
4
-
-
15744367730
-
Design and implementation of the idemix anonymous credential system
-
IBM Research Division
-
Camenisch, J. and Herreweghen, E.V. (2002), "Design and implementation of the idemix anonymous credential system", Technical report, IBM Research Division.
-
(2002)
Technical Report
-
-
Camenisch, J.1
Herreweghen, E.V.2
-
5
-
-
70249137366
-
-
CardSpace available at
-
CardSpace (2007), "Windows CardSpace", available at: http://netfx3.com/content/WindowsCardspaceHome.aspx
-
(2007)
Windows CardSpace
-
-
-
7
-
-
70249122873
-
-
available at
-
Custodix (2008), "Custodix home", available at: www.custodix.com/
-
(2008)
Custodix Home
-
-
-
8
-
-
70249116549
-
-
EC Martinus Nijhofi Publishers, Leiden
-
EC (1987), European Convention on Human Rights, Martinus Nijhofi Publishers, Leiden.
-
(1987)
European Convention on Human Rights
-
-
-
9
-
-
70249109837
-
-
EHIP available at
-
EHIP (2008), "eHealth information platforms", available at: www.ibbt.be/en/project/e-hip
-
(2008)
EHealth Information Platforms
-
-
-
10
-
-
0003187764
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
EU
-
EU (1995), "Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data", Official Journal of the European Communities, Vol.281, pp. 31-50.
-
(1995)
Official Journal of the European Communities
, vol.281
, pp. 31-50
-
-
-
14
-
-
34548557737
-
Multi-centric universal pseudonymisation for secondary use of the HER
-
Iacono, L.L. (2007), "Multi-centric universal pseudonymisation for secondary use of the HER", Studies in Health Technology and Informatics, Vol.126, pp. 239-247
-
(2007)
Studies in Health Technology and Informatics
, vol.126
, pp. 239-247
-
-
Iacono, L.L.1
-
18
-
-
33750083950
-
User centric identity management
-
Clark, AL. (Ed.)
-
Josang, A. and Pope, S. (2005), "User centric identity management", in Clark, AL. (Ed.), Proceedings of AusCERT 2005, May, Brisbane, Australia.
-
(2005)
Proceedings of AusCERT 2005, May, Brisbane, Australia
-
-
Josang, A.1
Pope, S.2
-
20
-
-
34250648222
-
-
Liberty Alliance Project 23 March
-
Liberty Alliance Project (2006), "Liberty alliance project whitepaper: personal identity", 23 March, available at: www.projectliberty.org/liberty/content/download/395/2744/file/Personal-Identity. pdf
-
(2006)
Liberty Alliance Project Whitepaper: Personal Identity
-
-
-
21
-
-
70249139607
-
-
Liberty Alliance Project available at
-
Liberty Alliance Project (2008), "Liberty technology glossary working draft", available at: http:// xml.coverpages.org/draft-liberty- tech-glossary-08.pdf
-
(2008)
Liberty Technology Glossary Working Draft
-
-
-
24
-
-
47649120833
-
Addressing privacy in a federated identity management network for eHealth
-
Peyton, L., Hu, J., Doshi, C. and Seguin, P. (2007), "Addressing privacy in a federated identity management network for eHealth", Eighth World Congress on the Management of eBusiness.WCMeB 2007, IEEE Computer Society, Toronto, p. 12.
-
(2007)
Eighth World Congress on the Management of EBusiness.WCMeB 2007, IEEE Computer Society, Toronto
, pp. 12
-
-
Peyton, L.1
Hu, J.2
Doshi, C.3
Seguin, P.4
-
25
-
-
15544389962
-
Secondary use of the EHR via pseudonymisation
-
Bos, L., Laxminarayan, S. and Marsh, A. (Eds) IOS Press, Amsterdam
-
Pommerening, K. and Reng, M. (2004), "Secondary use of the EHR via pseudonymisation", in Bos, L., Laxminarayan, S. and Marsh, A. (Eds), Medical Care Compunetics 1, IOS Press, Amsterdam, pp. 441-446
-
(2004)
Medical Care Compunetics 1
, pp. 441-446
-
-
Pommerening, K.1
Reng, M.2
-
26
-
-
70249136634
-
-
Portlet available at
-
Portlet (2008), "JSR-286, the Java Portlet API 2.0", available at: www.jcp.org/en/jsr/detail?id=268
-
(2008)
JSR-286, the Java Portlet API 2.0
, vol.268
-
-
-
28
-
-
33745921872
-
Shibboleth architecture. Technical overview. Working draft 02
-
Scavo, T. and Cantor, S. (2005), "Shibboleth architecture. Technical overview. Working draft 02", Technical report, Internet2/MACE
-
(2005)
Technical Report, Internet2/MACE
-
-
Scavo, T.1
Cantor, S.2
-
29
-
-
26344438872
-
-
available at
-
Shibboleth (2001), "Shibboleth overview and requirements", available at: http://shibboleth. internet2.edu/docs/draft-internet2-shibboleth- requirements-01.html
-
(2001)
Shibboleth Overview and Requirements
-
-
-
30
-
-
33644855528
-
HIPAA administrative simplification: Enforcement; Final rule
-
United States Department of Health and Human Service
-
United States Department of Health and Human Service (2006), "HIPAA administrative simplification: enforcement; final rule", Federal Register/Rules and Regulations, European Convention on Human Rights, Vol.71 No.32.
-
(2006)
Federal Register/Rules and Regulations, European Convention on Human Rights
, vol.71
, Issue.32
-
-
-
31
-
-
49049105933
-
Hardening XDS-based architectures
-
Wuyts, K., Scandariato, R., Claeys, G. and Joosen, W. (2008), "Hardening XDS-based architectures", Third International Conference on Availability, Reliability and Security 2008, ARES08, Barcelona, pp. 18-25.
-
(2008)
Third International Conference on Availability, Reliability and Security 2008, ARES08, Barcelona
, pp. 18-25
-
-
Wuyts, K.1
Scandariato, R.2
Claeys, G.3
Joosen, W.4
|