메뉴 건너뛰기




Volumn 21, Issue 6, 2010, Pages 754-764

Cross-domain data sharing in distributed electronic health record systems

Author keywords

Cross domain; Delegation; Electronic health record; Privacy; Security

Indexed keywords

CROSS-DOMAIN; DELEGATION; ELECTRONIC HEALTH RECORD; PRIVACY; SECURITY;

EID: 77956230334     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2009.124     Document Type: Article
Times cited : (105)

References (34)
  • 1
    • 33745197754 scopus 로고    scopus 로고
    • Privacy concerns hinder electronic medical records
    • Apr.
    • M.C. Rash, "Privacy Concerns Hinder Electronic Medical Records," Business J. Greater Triad Area, Apr. 2005.
    • (2005) Business J. Greater Triad Area
    • Rash, M.C.1
  • 2
    • 38049059926 scopus 로고    scopus 로고
    • Warnings over privacy of us health network
    • Feb.
    • R. Pear, "Warnings over Privacy of US Health Network," New York Times, Feb. 2007.
    • (2007) New York Times
    • Pear, R.1
  • 3
    • 34047136102 scopus 로고    scopus 로고
    • The need for technical solutions for maintaining the privacy of ehr
    • Sept.
    • P. Ray and J. Wimalasiri, "The Need for Technical Solutions for Maintaining the Privacy of EHR," Proc. 28th IEEE EMBS Ann. Int'l Conf., pp. 4686-4689, Sept. 2006.
    • (2006) Proc. 28th IEEE EMBS Ann. Int'l Conf. , pp. 4686-4689
    • Ray, P.1    Wimalasiri, J.2
  • 4
    • 18044367110 scopus 로고    scopus 로고
    • Wireless technology infrastructures for authentication of patients: Pki that rings
    • U. Sax, I. Kohane, and K.D. Mandl, "Wireless Technology Infrastructures for Authentication of Patients: PKI That Rings," J. Am. Medical Informatics Assoc., vol.12, no.3, pp. 263-268, 2005.
    • (2005) J. Am. Medical Informatics Assoc. , vol.12 , Issue.3 , pp. 263-268
    • Sax, U.1    Kohane, I.2    Mandl, K.D.3
  • 6
    • 39449106296 scopus 로고    scopus 로고
    • A Cryptographic key management solution for hipaa privacy/security regulations
    • Jan.
    • W.-B. Lee and C.-D. Lee, "A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations," IEEE Trans. Information Technology in Biomedicine, vol.12, no.1, pp. 34-41, Jan. 2008.
    • (2008) IEEE Trans. Information Technology in Biomedicine , vol.12 , Issue.1 , pp. 34-41
    • Lee, W.-B.1    Lee, C.-D.2
  • 9
    • 33846925115 scopus 로고    scopus 로고
    • Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems
    • Sept.
    • S.-D. Bao, Y.-T. Zhang, and L.-F. Shen, "Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems," Proc. 28th IEEE EMBS Ann. Int'l Conf., pp. 58-65, Sept. 2005.
    • (2005) Proc. 28th IEEE EMBS Ann. Int'l Conf. , pp. 58-65
    • Bao, S.-D.1    Zhang, Y.-T.2    Shen, L.-F.3
  • 10
    • 77956228172 scopus 로고    scopus 로고
    • Delegation in a distributed healthcare context: A survey of current approaches
    • S.K. Katsikas et al., eds.
    • M. Katzarova and A. Simpson, "Delegation in a Distributed Healthcare Context: A Survey of Current Approaches," Proc. Information Security Conf. (ISC '06), S.K. Katsikas et al., eds. 2006.
    • (2006) Proc. Information Security Conf. (ISC '06)
    • Katzarova, M.1    Simpson, A.2
  • 11
    • 77956228535 scopus 로고    scopus 로고
    • O.S.S.T. Committee, SAML V2.0, www.oasis-open.org/ committees/, 2009.
    • (2009) SAML V2.0
  • 12
    • 77956226145 scopus 로고    scopus 로고
    • O. eXstensible Access Control Markup Language Committee, XACML V2.0, www.oasis-open.org/committees/, 2009.
    • (2009) XACML V2.0
  • 15
    • 3042684910 scopus 로고    scopus 로고
    • A rule-based framework for role-based delegation and revocation
    • L. Zhang, G.J. Ahn, and B.T. Chu, "A Rule-Based Framework for Role-Based Delegation and Revocation," ACM Trans. Information and System Security, vol.6, no.3, pp. 404-441, 2003.
    • (2003) ACM Trans. Information and System Security , vol.6 , Issue.3 , pp. 404-441
    • Zhang, L.1    Ahn, G.J.2    Chu, B.T.3
  • 16
  • 17
    • 0031387996 scopus 로고    scopus 로고
    • Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
    • R.K. Thomas, "Team-Based Access Control (TMAC): A Primitive for Applying Role-Based Access Controls in Collaborative Environments," Proc. Second ACM Workshop Role-Based Access Control, pp. 13-19, 1997.
    • (1997) Proc. Second ACM Workshop Role-Based Access Control , pp. 13-19
    • Thomas, R.K.1
  • 18
    • 0012970453 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairings
    • Springer-Verlag
    • D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairings," Advances in Cryptology-Asiacrypt 2001, pp. 514- 532, Springer-Verlag, 2001.
    • (2001) Advances in Cryptology-Asiacrypt 2001 , pp. 514-532
    • Boneh, D.1    Franklin, M.2
  • 21
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing. Extended abstract in CRYPTO 2001
    • D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing. Extended Abstract in CRYPTO 2001," SIAM J. Computing, vol.32, no.3, pp. 586-615, 2003.
    • (2003) SIAM J. Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 24
    • 77956231676 scopus 로고    scopus 로고
    • "Liberty Alliance Project," http://www.projectliberty.org/, 2009.
    • (2009)
  • 25
    • 77956230466 scopus 로고    scopus 로고
    • "Electronic Health Record," http://en.wikipedia.org/wiki/ Electronic-health-record, 2009.
    • (2009)
  • 26
    • 38349188084 scopus 로고    scopus 로고
    • U.D. of Health & Human Services Website
    • U.D. of Health & Human Services Website "Health Information Technology," http://www.hhs.gov/healthit/, 2009.
    • (2009) Health Information Technology
  • 29
    • 51349100827 scopus 로고    scopus 로고
    • A security architecture achieving anonymity and traceability in wireless mesh networks
    • Apr.
    • J. Sun, C. Zhang, and Y. Fang, "A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks," Proc. IEEE INFOCOM, pp. 1687-1695, Apr. 2008.
    • (2008) Proc. IEEE INFOCOM , pp. 1687-1695
    • Sun, J.1    Zhang, C.2    Fang, Y.3
  • 30
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity-based signature schemes based on pairings
    • Springer- Verlag
    • F. Hess, "Efficient Identity-Based Signature Schemes Based on Pairings," Selected Areas in Cryptography, pp. 310-324, Springer- Verlag, 2002.
    • (2002) Selected Areas in Cryptography , pp. 310-324
    • Hess, F.1
  • 34
    • 79551689384 scopus 로고    scopus 로고
    • Privacy-preserving location tracking of lost or stolen devices: Cryptographic techniques and replacing trusted third parties with DHTs
    • July
    • T. Ristenpart, G. Maganis, A. Krishnamurthy, and T. Kohno, "Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs," Proc. 17th USENIX Security Symp., pp. 275-290, July 2008.
    • (2008) Proc. 17th USENIX Security Symp. , pp. 275-290
    • Ristenpart, T.1    Maganis, G.2    Krishnamurthy, A.3    Kohno, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.