메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Threat analysis of online health information system

Author keywords

Information health systems; Privacy; Traitor tracing schemes

Indexed keywords

ELECTRONIC HEALTH RECORD; HEALTH RECORDS; HEALTH SYSTEMS; ONLINE HEALTH INFORMATION; PRIVACY; PRIVACY AND SECURITY; SECURITY AND PRIVACY; THREAT ANALYSIS; TRAITOR-TRACING;

EID: 77956287645     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1839294.1839331     Document Type: Conference Paper
Times cited : (11)

References (43)
  • 2
    • 70349323153 scopus 로고    scopus 로고
    • Assessing privacy criteria for DRM using EU privacy legislation
    • A. Becker. A. Arnah, and M. Semi, "Assessing privacy criteria for drm using eu privacy legislation," in Proc. of the 8th ACM workshop on DRM, pp. 77-86, 2008.
    • (2008) Proc. of the 8th ACM Workshop on DRM , pp. 77-86
    • Becker, A.1    Arnah, A.2    Semi, M.3
  • 3
    • 70349264141 scopus 로고    scopus 로고
    • A Four-Layer model for security of digital rights management
    • E. Diehl, "A Four-Layer model for security of digital rights management," in Proc. of the 8th ACM workshop on DRM, pp. 19-28, 2008.
    • (2008) Proc. of the 8th ACM Workshop on DRM , pp. 19-28
    • Diehl, E.1
  • 4
    • 0036431099 scopus 로고    scopus 로고
    • Applying digital rights management systems to privacy rights management
    • S. Kenny, and L. Korba,"Applying digital rights management systems to privacy rights management," Computer and security, vol.21, no.7, pp. 648-664, 2002.
    • (2002) Computer and Security , vol.21 , Issue.7 , pp. 648-664
    • Kenny, S.1    Korba, L.2
  • 5
    • 77954324120 scopus 로고    scopus 로고
    • Towards an open, trusted digital rights management platform
    • A. Cooper and A. Martin." Towards an open, trusted digital rights management platform," in Proc. of the ACM workshop on DRM, pp 79-88, 2006.
    • (2006) Proc. of the ACM Workshop on DRM , pp. 79-88
    • Cooper, A.1    Martin, A.2
  • 7
    • 0013138808 scopus 로고    scopus 로고
    • Dynamic traitor-tracing
    • A. Fiat and T.Tassa, "Dynamic traitor-tracing," J. of Cryptology, vol.14, pp. 211-223, 2001.
    • (2001) J. of Cryptology , vol.14 , pp. 211-223
    • Fiat, A.1    Tassa, T.2
  • 13
    • 84937418847 scopus 로고    scopus 로고
    • Efficient asymmetric self-enforcement scheme with public traceability
    • H. Komaki, Y. Watanabe, G. Hanaoka, and H. mai, "Efficient asymmetric self-enforcement scheme with public traceability," LNCS public key cryptography, pp. 225-239, 2000.
    • (2000) LNCS Public Key Cryptography , pp. 225-239
    • Komaki, H.1    Watanabe, Y.2    Hanaoka, G.3    Mai, H.4
  • 16
    • 0035919180 scopus 로고    scopus 로고
    • National health information privacy, regulations under the health insurance portability trod acccaintithility act
    • O. Gostin, "National health information privacy, regulations under the health insurance portability trod acccaintithility act," J. of the American medical association, vol.285, no.23. pp. 3015-3621, 2001.
    • (2001) J. of the American Medical Association , vol.285 , Issue.23 , pp. 3015-3621
    • Gostin, O.1
  • 17
    • 33947218255 scopus 로고    scopus 로고
    • In sickness, health, and cyberspace: Protecting the security of electronic private health information
    • S. Hoffman and A. Podgurski, "In sickness, health, and cyberspace: protecting the security of electronic private health information," Case legal studies research paper, pp. 06-15, 2006.
    • (2006) Case Legal Studies Research Paper , pp. 06-15
    • Hoffman, S.1    Podgurski, A.2
  • 18
    • 33947534852 scopus 로고    scopus 로고
    • Health policy and ethics: Patient confidentiality in the research use of clinical medical databases
    • R. Krishna, K. Kelleher, and E Stahl berg, "Health policy and ethics: patient confidentiality in the research use of clinical medical databases," American J. of public health, vol 97, no.4, 2007.
    • (2007) American J. of Public Health , vol.97 , Issue.4
    • Krishna, R.1    Kelleher, K.2    Stahl Berg, E.3
  • 21
    • 3042770199 scopus 로고    scopus 로고
    • Computational disclosure control for medical microdata: The datally system
    • National Academy Press
    • I. Sweeney, "Computational disclosure control for medical microdata: The datally system," in record linkage techniques workshop, National Academy Press, pp. 442-453, 1999.
    • (1999) Record Linkage Techniques Workshop , pp. 442-453
    • Sweeney, I.1
  • 26
    • 3242743529 scopus 로고    scopus 로고
    • Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behaviors
    • A. Acquisti and I. Grossklags, "Losses, gains, and hyperbolic discounting: an experimental approach to information security attitudes and behaviors," Second workshop on the economics of information security, 2003.
    • (2003) Second Workshop on the Economics of Information Security
    • Acquisti, A.1    Grossklags, I.2
  • 27
    • 67650897413 scopus 로고    scopus 로고
    • When 25 cents is too much: An experiment on willingness-to-sell and willingness-toprotect personal information
    • J. Grossklags and A. Acquisti, "When 25 cents is too much: an experiment on willingness-to-sell and willingness-toprotect personal information," 6th workshop on economics of information security, 2007.
    • (2007) 6th Workshop on Economics of Information Security
    • Grossklags, J.1    Acquisti, A.2
  • 30
    • 20944447987 scopus 로고    scopus 로고
    • An economics perspective on the sharing of information related to security breaches: Concepts and empirical evidence
    • L. A. Gordon, " An economics perspective on the sharing of information related to security breaches: concepts and empirical evidence," workshop on the economics of information security, 2002.
    • (2002) Workshop on the Economics of Information Security
    • Gordon, L.A.1
  • 31
    • 72249119892 scopus 로고    scopus 로고
    • The economic consequences of sharing security information
    • E. Gal and A. Ghose, "The economic consequences of sharing security information," Economics of Information Security, pp. 95-104, 2006.
    • (2006) Economics of Information Security , pp. 95-104
    • Gal, E.1    Ghose, A.2
  • 36
    • 77957959481 scopus 로고    scopus 로고
    • On the viability of privacyenhancing technologies in a self-regulated business-toconsumer market: Will privacy remain a luxury good?
    • R. Bohme and S. Kohlc, "On the viability of privacyenhancing technologies in a self- regulated business-toconsumer market: will privacy remain a luxury good?," 6th workshop on economics of information security, 2007.
    • (2007) 6th Workshop on Economics of Information Security
    • Bohme, R.1    Kohlc, S.2
  • 38
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sept
    • J.H. Saltier and M.D. Schroeder, "The protection of information in computer systems," in Proc. of the IEEE. vol.63, no.9, pp. 1278-1308, Sept 1975.
    • (1975) Proc. of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltier, J.H.1    Schroeder, M.D.2
  • 39
    • 0141642166 scopus 로고    scopus 로고
    • On the security of some password authentication protocols
    • B. Hsieh, H. Sun. and T. Hwang. " On the security of some password authentication protocols:' J. of informatica. no 2, pp. 195-204, 2003.
    • (2003) J. of Informatica , Issue.2 , pp. 195-204
    • Hsieh, B.1    Sun., H.2    Hwang, T.3
  • 40
    • 35248831207 scopus 로고    scopus 로고
    • Breaking and repairing asymmetric public-key traitor-tracing
    • A. Kitiyias and M. Yung, " Breaking and repairing asymmetric public-key traitor-tracing," LNCS digital rights management, pp. 32-50, 2003.
    • (2003) LNCS Digital Rights Management , pp. 32-50
    • Kitiyias, A.1    Yung, M.2
  • 42
    • 0028592391 scopus 로고
    • Electronic marking and identification techniques to discourage document copying
    • J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman, "Electronic marking and identification techniques to discourage document copying," in Proc. of IEEE INFOCOM, 1994, 3, pp. 1278 -1287.
    • (1994) Proc. of IEEE INFOCOM , vol.3 , pp. 1278-1287
    • Brassil, J.1    Low, S.2    Maxemchuk, N.3    O'gorman, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.