메뉴 건너뛰기




Volumn , Issue , 2010, Pages 268-275

Security models and requirements for healthcare application clouds

Author keywords

Cloud computing; EHR; Healthcare; Privacy; Security

Indexed keywords

ACADEMIC COMMUNITY; CLOUD COMPUTING; CORE COMPONENTS; EHR; ELECTRONIC HEALTH RECORD; HEALTH CARE APPLICATION; HEALTHCARE INDUSTRY; PRIVACY; REFERENCE MODELS; SECURITY; SECURITY AND PRIVACY ISSUES; SECURITY COUNTERMEASURES; SECURITY GUARDS; SECURITY ISSUES; SECURITY MODEL;

EID: 77957968012     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CLOUD.2010.62     Document Type: Conference Paper
Times cited : (313)

References (22)
  • 3
    • 84931064871 scopus 로고
    • Security in hospital information systems, security and data protection programme
    • presented at the, Durham
    • B. Barber, D. Garwood, P. Skerman, In: Security in Hospital Information Systems, Security and data protection programme presented at the IMIA WH10 Working conference, Durham. 1994.
    • (1994) IMIA WH10 Working Conference
    • Barber, B.1    Garwood, D.2    Skerman, P.3
  • 6
    • 84867786332 scopus 로고    scopus 로고
    • Electronic medical records Vs. Electronic health records: Yes, there is a difference
    • January 26
    • D. Garets and M. Davis, A HIMSS Analytics White Paper. Electronic Medical Records vs. Electronic Health Records: Yes, There Is a Difference. January 26, 2006http://www.himssanalytics.org/docs/wp-emr-ehr.pdf.
    • (2006) A HIMSS Analytics White Paper
    • Garets, D.1    Davis, M.2
  • 7
    • 59349103556 scopus 로고    scopus 로고
    • Inter-organization future proof HER systems- A review of the security and privacy related issues
    • H. Linden, D. Kalra, A. Hasman, J. Talmon. Inter-organization future proof HER systems-A review of the security and privacy related issues. International Journal of Medical Informatics, 78(2009), 141-160.
    • (2009) International Journal of Medical Informatics , vol.78 , pp. 141-160
    • Linden, H.1    Kalra, D.2    Hasman, A.3    Talmon, J.4
  • 13
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • August
    • S. G. Akl and P. D. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3):239-248, August 1983.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 14
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • W.-G. Tzeng, A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy, IEEE Trans. On Knowl. and Data Eng., 14(1), 182-188, 2002.
    • (2002) IEEE Trans. on Knowl. and Data Eng. , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.-G.1
  • 15
    • 85024290278 scopus 로고
    • Group signatures
    • volume 547 of Lecture Notes in Computer Science
    • D. Chaum and E. van Heyst. Group signatures. Advances in Cryptology - EUROCRYPT '91, volume 547 of Lecture Notes in Computer Science. 1991, pp. 257-265.
    • (1991) Advances in Cryptology - EUROCRYPT '91 , pp. 257-265
    • Chaum, D.1    Heyst, E.V.2
  • 16
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • LNCS 1880. Heidelberg: Springer-Verlag
    • G. Ateniese, J. Camenisch, M. Joye, et al. A practical and provably secure coalition-resistant group signature scheme. Advances in Cryptology-CRYPTO, LNCS 1880. Heidelberg: Springer-Verlag, 2000.
    • (2000) Advances in Cryptology-CRYPTO
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3
  • 19
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • R. Rivest, A. Shamir, and Y. Tauman. How to leak a secret, ASIACRYPT 2001. Volume 2248, 552-565.
    • (2001) ASIACRYPT , vol.2248 , pp. 552-565
    • Rivest, R.1    Shamir, A.2    Tauman, Y.3
  • 21
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • October
    • D. Chaum. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, October 1985, 28 (10): 1030-1044.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.