-
1
-
-
33745197754
-
Privacy concerns hinder electronic medical records
-
Apr.
-
M.C. Rash, "Privacy Concerns Hinder Electronic Medical Records," Business J. Greater Triad Area, Apr. 2005.
-
(2005)
Business J. Greater Triad Area
-
-
Rash, M.C.1
-
2
-
-
38049059926
-
Warnings over privacy of us health network
-
Feb.
-
R. Pear, "Warnings over Privacy of US Health Network," New York Times, Feb. 2007.
-
(2007)
New York Times
-
-
Pear, R.1
-
3
-
-
34047136102
-
The need for technical solutions for maintaining the privacy of ehr
-
Sept.
-
P. Ray and J. Wimalasiri, "The Need for Technical Solutions for Maintaining the Privacy of EHR," Proc. 28th IEEE EMBS Ann. Int'l Conf., pp. 4686-4689, Sept. 2006.
-
(2006)
Proc. 28th IEEE EMBS Ann. Int'l Conf.
, pp. 4686-4689
-
-
Ray, P.1
Wimalasiri, J.2
-
4
-
-
18044367110
-
Wireless technology infrastructures for authentication of patients: Pki that rings
-
U. Sax, I. Kohane, and K.D. Mandl, "Wireless Technology Infrastructures for Authentication of Patients: PKI That Rings," J. Am. Medical Informatics Assoc., vol.12, no.3, pp. 263-268, 2005.
-
(2005)
J. Am. Medical Informatics Assoc.
, vol.12
, Issue.3
, pp. 263-268
-
-
Sax, U.1
Kohane, I.2
Mandl, K.D.3
-
6
-
-
39449106296
-
A Cryptographic key management solution for hipaa privacy/security regulations
-
Jan.
-
W.-B. Lee and C.-D. Lee, "A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations," IEEE Trans. Information Technology in Biomedicine, vol.12, no.1, pp. 34-41, Jan. 2008.
-
(2008)
IEEE Trans. Information Technology in Biomedicine
, vol.12
, Issue.1
, pp. 34-41
-
-
Lee, W.-B.1
Lee, C.-D.2
-
7
-
-
56749165131
-
Body sensor network security: An identity-based cryptography approach
-
Apr.
-
C.C. Tan, H. Wang, S. Zhong, and Q. Li, "Body Sensor Network Security: An Identity-Based Cryptography Approach," Proc. ACM Conf. Wireless Network Security (WiSec '08), Apr. 2008.
-
(2008)
Proc. ACM Conf. Wireless Network Security (WiSec '08)
-
-
Tan, C.C.1
Wang, H.2
Zhong, S.3
Li, Q.4
-
9
-
-
33846925115
-
Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems
-
Sept.
-
S.-D. Bao, Y.-T. Zhang, and L.-F. Shen, "Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems," Proc. 28th IEEE EMBS Ann. Int'l Conf., pp. 58-65, Sept. 2005.
-
(2005)
Proc. 28th IEEE EMBS Ann. Int'l Conf.
, pp. 58-65
-
-
Bao, S.-D.1
Zhang, Y.-T.2
Shen, L.-F.3
-
10
-
-
77956228172
-
Delegation in a distributed healthcare context: A survey of current approaches
-
S.K. Katsikas et al., eds.
-
M. Katzarova and A. Simpson, "Delegation in a Distributed Healthcare Context: A Survey of Current Approaches," Proc. Information Security Conf. (ISC '06), S.K. Katsikas et al., eds. 2006.
-
(2006)
Proc. Information Security Conf. (ISC '06)
-
-
Katzarova, M.1
Simpson, A.2
-
11
-
-
77956228535
-
-
O.S.S.T. Committee, SAML V2.0, www.oasis-open.org/ committees/, 2009.
-
(2009)
SAML V2.0
-
-
-
12
-
-
77956226145
-
-
O. eXstensible Access Control Markup Language Committee, XACML V2.0, www.oasis-open.org/committees/, 2009.
-
(2009)
XACML V2.0
-
-
-
13
-
-
17644368658
-
X.509 Proxy certificates for dynamic delegation
-
V. Welch, I. Foster, C. Kesselman, O. Mulmo, L. Pearlman, S. Tuecke, J. Gawor, S. Meder, and F. Siebenlist, "X.509 Proxy Certificates for Dynamic Delegation," Proc. Third Ann. PKI R&D Workshop, 2004.
-
(2004)
Proc. Third Ann. PKI R&D Workshop
-
-
Welch, V.1
Foster, I.2
Kesselman, C.3
Mulmo, O.4
Pearlman, L.5
Tuecke, S.6
Gawor, J.7
Meder, S.8
Siebenlist, F.9
-
14
-
-
11244339991
-
Secure proxy signature schemes for delegation of signing rights
-
A. Boldyreva, A. Palacio, and B. Warinschi, "Secure Proxy Signature Schemes for Delegation of Signing Rights," Cryptology ePrint Archive, Report 2003/096, http://eprint.iacr.org/2003/ 096.pdf, 2003.
-
(2003)
Cryptology EPrint Archive, Report 2003/096
-
-
Boldyreva, A.1
Palacio, A.2
Warinschi, B.3
-
15
-
-
3042684910
-
A rule-based framework for role-based delegation and revocation
-
L. Zhang, G.J. Ahn, and B.T. Chu, "A Rule-Based Framework for Role-Based Delegation and Revocation," ACM Trans. Information and System Security, vol.6, no.3, pp. 404-441, 2003.
-
(2003)
ACM Trans. Information and System Security
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.J.2
Chu, B.T.3
-
16
-
-
0030086382
-
Role- Based access control models
-
Oct.
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, "Role- Based Access Control Models," Computer, vol.29, no.2, pp. 38-47, Oct. 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
17
-
-
0031387996
-
Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
-
R.K. Thomas, "Team-Based Access Control (TMAC): A Primitive for Applying Role-Based Access Controls in Collaborative Environments," Proc. Second ACM Workshop Role-Based Access Control, pp. 13-19, 1997.
-
(1997)
Proc. Second ACM Workshop Role-Based Access Control
, pp. 13-19
-
-
Thomas, R.K.1
-
18
-
-
0012970453
-
Identity-based encryption from the weil pairings
-
Springer-Verlag
-
D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairings," Advances in Cryptology-Asiacrypt 2001, pp. 514- 532, Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology-Asiacrypt 2001
, pp. 514-532
-
-
Boneh, D.1
Franklin, M.2
-
20
-
-
17444370055
-
Public key encryption with keyword search
-
D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," Proc. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004.
-
(2004)
Proc. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT)
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
21
-
-
0037623983
-
Identity-based encryption from the weil pairing. Extended abstract in CRYPTO 2001
-
D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing. Extended Abstract in CRYPTO 2001," SIAM J. Computing, vol.32, no.3, pp. 586-615, 2003.
-
(2003)
SIAM J. Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
22
-
-
33750089381
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and Extensions
-
V. Shoup, ed.
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, "Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions," Proc. Int'l Cryptology Conf. (CRYPTO), V. Shoup, ed., 2005.
-
(2005)
Proc. Int'l Cryptology Conf. (CRYPTO)
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
24
-
-
77956231676
-
-
"Liberty Alliance Project," http://www.projectliberty.org/, 2009.
-
(2009)
-
-
-
25
-
-
77956230466
-
-
"Electronic Health Record," http://en.wikipedia.org/wiki/ Electronic-health-record, 2009.
-
(2009)
-
-
-
26
-
-
38349188084
-
-
U.D. of Health & Human Services Website
-
U.D. of Health & Human Services Website "Health Information Technology," http://www.hhs.gov/healthit/, 2009.
-
(2009)
Health Information Technology
-
-
-
27
-
-
33846324046
-
Identity-Based Cryptography for Grid Security
-
H. Stockinger, R. Buyya, and R. Perrott, eds.
-
H.W. Lim and K.G. Paterson, "Identity-Based Cryptography for Grid Security," Proc. First IEEE Int'l Conf. e-Science and Grid Computing (e-Science '05), H. Stockinger, R. Buyya, and R. Perrott, eds., 2005.
-
(2005)
Proc. First IEEE Int'l Conf. E-Science and Grid Computing (E-Science '05)
-
-
Lim, H.W.1
Paterson, K.G.2
-
29
-
-
51349100827
-
A security architecture achieving anonymity and traceability in wireless mesh networks
-
Apr.
-
J. Sun, C. Zhang, and Y. Fang, "A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks," Proc. IEEE INFOCOM, pp. 1687-1695, Apr. 2008.
-
(2008)
Proc. IEEE INFOCOM
, pp. 1687-1695
-
-
Sun, J.1
Zhang, C.2
Fang, Y.3
-
30
-
-
35248867510
-
Efficient identity-based signature schemes based on pairings
-
Springer- Verlag
-
F. Hess, "Efficient Identity-Based Signature Schemes Based on Pairings," Selected Areas in Cryptography, pp. 310-324, Springer- Verlag, 2002.
-
(2002)
Selected Areas in Cryptography
, pp. 310-324
-
-
Hess, F.1
-
31
-
-
54249101916
-
Public key encryption with keyword search revisited
-
J. Baek, R. Safiavi-Naini, and W. Susilo, "Public Key Encryption with Keyword Search Revisited," Cryptology ePrint Archive, Report 2005/191, http://eprint.iacr.org/2005/191.pdf, 2005.
-
(2005)
Cryptology EPrint Archive, Report 2005/191
-
-
Baek, J.1
Safiavi-Naini, R.2
Susilo, W.3
-
34
-
-
79551689384
-
Privacy-preserving location tracking of lost or stolen devices: Cryptographic techniques and replacing trusted third parties with DHTs
-
July
-
T. Ristenpart, G. Maganis, A. Krishnamurthy, and T. Kohno, "Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs," Proc. 17th USENIX Security Symp., pp. 275-290, July 2008.
-
(2008)
Proc. 17th USENIX Security Symp.
, pp. 275-290
-
-
Ristenpart, T.1
Maganis, G.2
Krishnamurthy, A.3
Kohno, T.4
|