-
2
-
-
0013628534
-
Communicating health information in an insecure world
-
(eds.)
-
R. Bakker, B. Barber, R. Tervo-Pellikka, A.Treacher, (eds.), Communicating Health Information in an Insecure World, in: Proceedings of the Helsinki Working Conference. 43:1, 1995. 2.
-
(1995)
Proceedings of the Helsinki Working Conference
, vol.43
, Issue.1
, pp. 2
-
-
Bakker, R.1
Barber, B.2
Tervo-Pellikka, R.3
Treacher, A.4
-
3
-
-
84931064871
-
Security in hospital information systems, security and data protection programme
-
presented at the, Durham
-
B. Barber, D. Garwood, P. Skerman, In: Security in Hospital Information Systems, Security and data protection programme presented at the IMIA WH10 Working conference, Durham. 1994.
-
(1994)
IMIA WH10 Working Conference
-
-
Barber, B.1
Garwood, D.2
Skerman, P.3
-
4
-
-
0029442762
-
Security management in the health-care environment
-
R.A. Greenes, H.E. Peterson, D.J. Protti, (eds.), Canada
-
S. M. Furnell, P.W. Sanders, Security management in the health-care environment, in: R.A. Greenes, H.E. Peterson, D.J. Protti, (eds.), MEDINFO '95, Proceedings of the eighth World Congress on Medical Informatics. Canada. p. 675-678.
-
MEDINFO '95, Proceedings of the Eighth World Congress on Medical Informatics
, pp. 675-678
-
-
Furnell, S.M.1
Sanders, P.W.2
-
6
-
-
84867786332
-
Electronic medical records Vs. Electronic health records: Yes, there is a difference
-
January 26
-
D. Garets and M. Davis, A HIMSS Analytics White Paper. Electronic Medical Records vs. Electronic Health Records: Yes, There Is a Difference. January 26, 2006http://www.himssanalytics.org/docs/wp-emr-ehr.pdf.
-
(2006)
A HIMSS Analytics White Paper
-
-
Garets, D.1
Davis, M.2
-
7
-
-
59349103556
-
Inter-organization future proof HER systems- A review of the security and privacy related issues
-
H. Linden, D. Kalra, A. Hasman, J. Talmon. Inter-organization future proof HER systems-A review of the security and privacy related issues. International Journal of Medical Informatics, 78(2009), 141-160.
-
(2009)
International Journal of Medical Informatics
, vol.78
, pp. 141-160
-
-
Linden, H.1
Kalra, D.2
Hasman, A.3
Talmon, J.4
-
8
-
-
70450252045
-
Patient-centric authorization framework for sharing electronic health records
-
Symposium on Access Control Models and Technologies
-
J. Jin, G.-J. Ahn, H. Hu, M. J. Covington, and X. Zhang. Patient-centric Authorization Framework for Sharing Electronic Health Records. Symposium on Access Control Models and Technologies, Proceedings of the 14th ACM symposium on Access control models and technologies, 2009, 125-134.
-
(2009)
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies
, pp. 125-134
-
-
Jin, J.1
Ahn, G.-J.2
Hu, H.3
Covington, M.J.4
Zhang, X.5
-
13
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
August
-
S. G. Akl and P. D. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3):239-248, August 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
14
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
W.-G. Tzeng, A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy, IEEE Trans. On Knowl. and Data Eng., 14(1), 182-188, 2002.
-
(2002)
IEEE Trans. on Knowl. and Data Eng.
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.-G.1
-
15
-
-
85024290278
-
Group signatures
-
volume 547 of Lecture Notes in Computer Science
-
D. Chaum and E. van Heyst. Group signatures. Advances in Cryptology - EUROCRYPT '91, volume 547 of Lecture Notes in Computer Science. 1991, pp. 257-265.
-
(1991)
Advances in Cryptology - EUROCRYPT '91
, pp. 257-265
-
-
Chaum, D.1
Heyst, E.V.2
-
16
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
LNCS 1880. Heidelberg: Springer-Verlag
-
G. Ateniese, J. Camenisch, M. Joye, et al. A practical and provably secure coalition-resistant group signature scheme. Advances in Cryptology-CRYPTO, LNCS 1880. Heidelberg: Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology-CRYPTO
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
-
21
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
October
-
D. Chaum. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, October 1985, 28 (10): 1030-1044.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
|