-
1
-
-
85050094297
-
An electronic patient record "on steroids": Distributed, peer-to-peer, secure and privacy-conscious
-
Canada
-
S. Abiteboul, B. Alexe, O. Benjelloun, B. Cautis, I. Fundulaki, T. Milo, A. Sahuguet, "An electronic patient record "on steroids": distributed, peer-to-peer, secure and privacy-conscious", VLDB 2004, Canada, pp. 1273-1276, 2004.
-
(2004)
VLDB 2004
, pp. 1273-1276
-
-
Abiteboul, S.1
Alexe, B.2
Benjelloun, O.3
Cautis, B.4
Fundulaki, I.5
Milo, T.6
Sahuguet, A.7
-
2
-
-
0035330891
-
Securing XML documents with Author-X
-
IEEE
-
E. Bertino, S. Castano and E. Ferrari, "Securing XML documents with Author-X", Internet Computing, IEEE, vol. 5, pp.21-31, 2001.
-
(2001)
Internet Computing
, vol.5
, pp. 21-31
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
4
-
-
39149103087
-
Dynamic access-control policies on XML encrypted data
-
L. Bouganim, F.D. Ngoc, P. Pucheral, "Dynamic access-control policies on XML encrypted data", ACM Transactions on Information and System Security (TISSEC), vol. 10, pp. 1-37, 2008.
-
(2008)
ACM Transactions on Information and System Security (TISSEC)
, vol.10
, pp. 1-37
-
-
Bouganim, L.1
Ngoc, F.D.2
Pucheral, P.3
-
5
-
-
85001697848
-
A fine-grained access control system for XML documents
-
E. Damiani, S. de Capitani di Vimercati, S. Paraboschi and P. Samarati, "A fine-grained access control system for XML documents", ACM Transactions on Information and System Security (TISSEC), vol. 5, pp.169-202, 2002.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, pp. 169-202
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
6
-
-
38049175061
-
-
KES 2007, Italy
-
E. Damiani, M. Fansi, A. Gabillon and S. Marrara, "Securely updating XML", KES 2007, Italy, pp. 1098-1106, 2007.
-
(2007)
Securely Updating XML
, pp. 1098-1106
-
-
Damiani, E.1
Fansi, M.2
Gabillon, A.3
Marrara, S.4
-
7
-
-
0035509987
-
Controlling access to XML documents
-
IEEE
-
E. Damiani, P. Samarati, S. de Capitani di Vimercati and S. Paraboschi, "Controlling access to XML documents', Internet Computing, IEEE, vol. 5, pp.18-28, 2001.
-
(2001)
Internet Computing
, vol.5
, pp. 18-28
-
-
Damiani, E.1
Samarati, P.2
De Capitani Di Vimercati, S.3
Paraboschi, S.4
-
8
-
-
33646738657
-
An introduction to personal health records
-
May
-
S. Endsley, D.C. Kibbe, A. Linares, and K. Colorafi, "An introduction to personal health records," Family Practice Management, pp. 57-62, May 2006.
-
(2006)
Family Practice Management
, pp. 57-62
-
-
Endsley, S.1
Kibbe, D.C.2
Linares, A.3
Colorafi, K.4
-
9
-
-
3142749878
-
Secure XML querying with security views
-
France
-
W. Fan, C. Chan, and M. Garofalakis, "Secure XML querying with security views", ACM SIGMOD International Conference on Management of Data (SIGMOD '04), France, pp. 587-598, 2004.
-
(2004)
ACM SIGMOD International Conference on Management of Data (SIGMOD '04)
, pp. 587-598
-
-
Fan, W.1
Chan, C.2
Garofalakis, M.3
-
10
-
-
33748485156
-
Attribute-based access control with hidden policies and hidden credentials
-
K. Frikken, M. Atallah, and J. Li, "Attribute-based access control with hidden policies and hidden credentials," IEEE Transactions on Computers, vol. 55, pp. 1259-1270, 2006.
-
(2006)
IEEE Transactions on Computers
, vol.55
, pp. 1259-1270
-
-
Frikken, K.1
Atallah, M.2
Li, J.3
-
12
-
-
57749102657
-
Security and privacy system architecture for an e-hospital environment
-
USA
-
K. Garson and C. Adams, "Security and privacy system architecture for an e-hospital environment," Symposium on Identity and Trust on the Internet, USA, pp. 122-130, 2008.
-
(2008)
Symposium on Identity and Trust on the Internet
, pp. 122-130
-
-
Garson, K.1
Adams, C.2
-
13
-
-
3543146068
-
Derived access control specification for XML
-
USA, 2003
-
S.K. Goel, C. Clifton and A. Rosenthal, A. (2003) "Derived access control specification for XML", ACM Workshop on XML Security, USA, pp. 1-14, 2003.
-
(2003)
ACM Workshop on XML Security
, pp. 1-14
-
-
Goel, S.K.1
Clifton, C.2
Rosenthal, A.A.3
-
14
-
-
33644593561
-
PKI-based secure mobile access to electronic health services and data
-
G. Kambourakis, I. Maglogiannis, and A. Rouskas, "PKI-based secure mobile access to electronic health services and data," Technology and Health Care, vol. 13, pp. 511-526, 2005.
-
(2005)
Technology and Health Care
, vol.13
, pp. 511-526
-
-
Kambourakis, G.1
Maglogiannis, I.2
Rouskas, A.3
-
15
-
-
57349145290
-
Context-aware role-based access control in pervasive computing systems
-
Estes Park, USA
-
D. Kulkarni and A. Tripathi, "Context-aware role-based access control in pervasive computing systems," ACM symposium on Access control models and technologies, Estes Park, USA, pp. 113-122, 2008.
-
(2008)
ACM Symposium on Access Control Models and Technologies
, pp. 113-122
-
-
Kulkarni, D.1
Tripathi, A.2
-
16
-
-
67349181381
-
Generalized XML security views
-
G.M. Kuper, F. Massacci and N. Rassadko, "Generalized XML security views", Int. J. Inf. Sec. (IJISEC), vol. 8, pp. 173-203, 2009.
-
(2009)
Int. J. Inf. Sec. (IJISEC)
, vol.8
, pp. 173-203
-
-
Kuper, G.M.1
Massacci, F.2
Rassadko, N.3
-
17
-
-
29244492464
-
-
Markle Foundation, available at
-
Markle Foundation, "Connecting for health a public-private collaborative", 2003, available at: http://www.connectingforhealth.org/ resources/final-phwg-report1.pdf.
-
(2003)
Connecting for Health A Public-private Collaborative
-
-
-
18
-
-
52149091653
-
Multi-domain and privacy-aware role based access control in eHealth
-
Finland
-
L.D. Martino, Q. Ni, D. Lin, and E. Bertino, "Multi-domain and privacy-aware role based access control in eHealth", International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth 2008), Finland, pp. 131-134, 2008.
-
(2008)
International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth 2008)
, pp. 131-134
-
-
Martino, L.D.1
Ni, Q.2
Lin, D.3
Bertino, E.4
-
19
-
-
85009120801
-
Controlling access to published data using cryptography
-
Germany
-
G. Miklau and D. Suciu, "Controlling access to published data using cryptography", VLDB 2003, Germany, pp. 898-909, 2003.
-
(2003)
VLDB 2003
, pp. 898-909
-
-
Miklau, G.1
Suciu, D.2
-
20
-
-
38149058588
-
IPAC - An Interactive Approach to Access Control for semi-structured data
-
Korea
-
S. Mohan and Y. Wu, IPAC - An Interactive Approach to Access Control for semi-structured data, VLDB 2006, Korea, pp. 1147-1150, 2006.
-
(2006)
VLDB 2006
, pp. 1147-1150
-
-
Mohan, S.1
Wu, Y.2
-
21
-
-
35048834844
-
Conceptual design of XML document warehouses
-
Spain
-
V. Nassis, R. Rajugan, T.S. Dillon, and W. Rahayu, "Conceptual design of XML document warehouses", International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2004), Spain, pp. 1-14, 2004.
-
(2004)
International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2004)
, pp. 1-14
-
-
Nassis, V.1
Rajugan, R.2
Dillon, T.S.3
Rahayu, W.4
-
22
-
-
2442512413
-
-
available at, Version 1.0
-
OASIS, "eXtensible Access Control Markup Language (XACML) Version 1.0", available at: http://www.oasisopen.org/committees/download.php/2406/ oasis-xacml-1.0.pdf, 2003.
-
(2003)
EXtensible Access Control Markup Language (XACML)
-
-
-
23
-
-
16644387094
-
The veterans health administration: Quality value, accountability, and information as transforming strategies for patient-centered care
-
J.B. Perlin, R.M. Kolodner and R.H. Rosswell, "The veterans health administration: quality value, accountability, and information as transforming strategies for patient-centered care", Am J Manag Care, vol. 10, pp. 828-836, 2004.
-
(2004)
Am J Manag Care
, vol.10
, pp. 828-836
-
-
Perlin, J.B.1
Kolodner, R.M.2
Rosswell, R.H.3
-
24
-
-
18044367110
-
Wireless technology infrastructures for authentication of patients: PKI that rings
-
U. Sax, I. Kohane and K.D. Mandl, "Wireless technology infrastructures for authentication of patients: PKI that rings," Journal of American Medical Informatics Assoc, vol. 12, pp. 263-268, 2005.
-
(2005)
Journal of American Medical Informatics Assoc
, vol.12
, pp. 263-268
-
-
Sax, U.1
Kohane, I.2
Mandl, K.D.3
-
25
-
-
34248337455
-
Framework and prototype for a secure XML-based electronic health records system
-
R. Steele, W. Gardner, D. Chandra, and T.S. Dillon, "Framework and prototype for a secure XML-based electronic health records system," International Journal of Electronic Healthcare, vol. 3 pp. 151-174, 2007.
-
(2007)
International Journal of Electronic Healthcare
, vol.3
, pp. 151-174
-
-
Steele, R.1
Gardner, W.2
Chandra, D.3
Dillon, T.S.4
-
26
-
-
71549156856
-
Elderly persons' perception and acceptance of using wireless sensor networks to assist healthcare
-
R. Steele, A. Lo, C. Secombe, YK. Wong, "Elderly Persons' Perception and Acceptance of Using Wireless Sensor Networks to Assist Healthcare". International Journal of Medical Informatics. 2009; 78(12): 788-801.
-
(2009)
International Journal of Medical Informatics
, vol.78
, Issue.12
, pp. 788-801
-
-
Steele, R.1
Lo, A.2
Secombe, C.3
Wong, Y.K.4
-
29
-
-
33847614450
-
MobiPass: A passport for mobile business
-
R. Steele and W. Tao, "MobiPass: A passport for mobile business," Personal and Ubiquitous Computing, vol. 11, pp. 157-169, 2007.
-
(2007)
Personal and Ubiquitous Computing
, vol.11
, pp. 157-169
-
-
Steele, R.1
Tao, W.2
-
32
-
-
0036357623
-
Implementing security and access control mechanisms for an electronic healthcare record
-
F.K. Uckert and H. Prokoschl, "Implementing security and access control mechanisms for an electronic healthcare record," AMIA Symp, pp. 825-829, 2002.
-
(2002)
AMIA Symp
, pp. 825-829
-
-
Uckert, F.K.1
Prokoschl, H.2
-
34
-
-
4143061356
-
A role-based approach to access control for XML databases
-
USA
-
J. Wang and S.L. Osborn, "A role-based approach to access control for XML databases", SACMAT 2004, USA, pp. 70-77, 2004.
-
(2004)
SACMAT 2004
, pp. 70-77
-
-
Wang, J.1
Osborn, S.L.2
-
35
-
-
34250763272
-
Encryption characteristics of two USB-based personal health record devices
-
A. Wright and D.F. Sittig, "Encryption characteristics of two USB-based personal health record devices," Journal of American Medical Informatics Assoc, vol. 14, pp. 397-399, 2007.
-
(2007)
Journal of American Medical Informatics Assoc
, vol.14
, pp. 397-399
-
-
Wright, A.1
Sittig, D.F.2
|