메뉴 건너뛰기




Volumn , Issue , 2010, Pages 55-60

Using digital rights management for securing data in a medical research environment

Author keywords

drm; electronic health records; microsoft ad rms

Indexed keywords

DIGITAL RIGHTS MANAGEMENT; DRM; ELECTRONIC HEALTH RECORD; FUTURE DIRECTIONS; HEALTH RESEARCH; MEDICAL RESEARCH; MICROSOFT AD-RMS; SECURITY FEATURES;

EID: 78650160589     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866870.1866883     Document Type: Conference Paper
Times cited : (16)

References (16)
  • 1
    • 78650165802 scopus 로고    scopus 로고
    • Microsoft Active Directory Rights Management Service. http://technet.microsoft.com/en-ca/windowsserver/dd448611.aspx.
  • 2
    • 78650100114 scopus 로고    scopus 로고
    • Microsoft Office SharePoint Server. http://sharepoint.microsoft.com/.
  • 6
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey of recent developments
    • B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys, 42(4):1-53, 2010.
    • (2010) ACM Computing Surveys , vol.42 , Issue.4 , pp. 1-53
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 8
    • 0036431099 scopus 로고    scopus 로고
    • Applying digital rights management systems to privacy rights management
    • DOI 10.1016/S0167-4048(02)01117-3
    • S. Kenny and L. Korba. Applying digital rights management systems to privacy rights management. Computers & Security, 21(7):648-664, 2002. (Pubitemid 35355525)
    • (2002) Computers and Security , vol.21 , Issue.7 , pp. 648-664
    • Kenny, S.1    Korba, L.2
  • 9
    • 78650087659 scopus 로고    scopus 로고
    • Security and Authentication Architecture Using MPEG-21 for Wireless Patient Monitoring Systems
    • W. Leister, T. Fretland, and I. Balasingham. Security and Authentication Architecture Using MPEG-21 for Wireless Patient Monitoring Systems. International Journal On Advances in Security, 2(1):16-29, 2009.
    • (2009) International Journal on Advances in Security , vol.2 , Issue.1 , pp. 16-29
    • Leister, W.1    Fretland, T.2    Balasingham, I.3
  • 10


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.