메뉴 건너뛰기




Volumn , Issue , 2010, Pages 341-346

Model-driven application-level encryption for the privacy of e-health data

Author keywords

Cryptography; Database encryption; Privacy enhancing technologies; Security and privacy in e Health

Indexed keywords

DATABASE ENCRYPTION; EHEALTH; PRIVACY-ENHANCING TECHNOLOGIES; SECURITY AND PRIVACY;

EID: 77952383756     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2010.91     Document Type: Conference Paper
Times cited : (42)

References (16)
  • 3
    • 77952370320 scopus 로고    scopus 로고
    • Health Insurance Portability and Accountability Act (HIPAA), http://www.hipaa.org.
  • 4
    • 77952336478 scopus 로고    scopus 로고
    • Jasypt - Java simplified encryption, http://www.jasypt.org.
  • 12
    • 77952402625 scopus 로고    scopus 로고
    • openArchitectureWare, http://www.openarchitectureware.org/.
  • 13
    • 77952398499 scopus 로고    scopus 로고
    • Oracle Transparent Data Encryption, http://www.oracle.com/technology/ oramag/oracle/05-sep/o55security.html.
  • 14
    • 15544389962 scopus 로고    scopus 로고
    • Secondary use of the EHR via pseudonymization
    • K. Pommerening and M. Reng, "Secondary Use of the EHR via Pseudonymization", Medical Care Compunetics I, pp. 441-446, 2004.
    • (2004) Medical Care Compunetics I , pp. 441-446
    • Pommerening, K.1    Reng, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.