메뉴 건너뛰기




Volumn , Issue , 2010, Pages 220-229

Securing the e-health cloud

Author keywords

client platform security; e health; information flow; isolation; security architecture

Indexed keywords

CLIENT PLATFORM SECURITY; EHEALTH; INFORMATION FLOWS; ISOLATION; SECURITY ARCHITECTURE;

EID: 78650938541     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1882992.1883024     Document Type: Conference Paper
Times cited : (206)

References (27)
  • 8
    • 77954342748 scopus 로고    scopus 로고
    • Common Criteria Project Sponsoring Organisations Version 3 1, July
    • Common Criteria Project Sponsoring Organisations. Common Criteria for Information Technology Security Evaluation, Version 3.1, July 2009. http://www.commoncriteriaportal.org/thecc.html.
    • (2009) Common Criteria for Information Technology Security Evaluation
  • 16
    • 84875040423 scopus 로고    scopus 로고
    • International Organization for Standardization (ISO). Technical Committee 215, Health Informatics. http://www.iso.org/iso/iso-technical-committee?commid= 54960.
    • Health Informatics
  • 17
    • 78650931094 scopus 로고    scopus 로고
    • Kassenärztliche Bundesvereinigung. KV-SafeNet homepage. http://www.kbv.de/12705.html.
    • KV-SafeNet Homepage
  • 19
    • 70350647626 scopus 로고    scopus 로고
    • Modeling trusted computing support in a protection profile for high assurance security kernels
    • Trusted Computing, 2nd International Conference, Trust 2009, Springer
    • H. Löhr, A.-R. Sadeghi, C. Stüble, M. Weber, and M. Winandy. Modeling trusted computing support in a protection profile for high assurance security kernels. In Trusted Computing, 2nd International Conference, Trust 2009, volume 5471 of Lecture Notes in Computer Science, pages 45-62. Springer, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5471 , pp. 45-62
    • Löhr, H.1    Sadeghi, A.-R.2    Stüble, C.3    Weber, M.4    Winandy, M.5
  • 20
    • 70350637714 scopus 로고    scopus 로고
    • Trusted privacy domains - Challenges for trusted computing in privacy-protecting information sharing
    • Information Security Practice and Experience, 5th International Conference, (ISPEC'09), Springer
    • H. Löhr, A. R. Sadeghi, C. Vishik, and M. Winandy. Trusted privacy domains - challenges for trusted computing in privacy-protecting information sharing. In Information Security Practice and Experience, 5th International Conference, (ISPEC'09), volume 5451 of Lecture Notes in Computer Science, pages 396-407. Springer, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5451 , pp. 396-407
    • Löhr, H.1    Sadeghi, A.R.2    Vishik, C.3    Winandy, M.4
  • 21
    • 77952390493 scopus 로고    scopus 로고
    • Patterns for secure boot and secure storage in computer systems
    • 4th International Workshop of Secure System Methodologies Using Patterns (SPattern 2010), IEEE Computer Society
    • H. Löhr, A.-R. Sadeghi, and M. Winandy. Patterns for secure boot and secure storage in computer systems. In 4th International Workshop of Secure System Methodologies Using Patterns (SPattern 2010), In Proc. of Fifth International Conference on Availability, Reliability and Security (ARES'10), pages 569-573. IEEE Computer Society, 2010.
    • (2010) Proc. of Fifth International Conference on Availability, Reliability and Security (ARES'10) , pp. 569-573
    • Löhr, H.1    Sadeghi, A.-R.2    Winandy, M.3
  • 27
    • 77952371831 scopus 로고    scopus 로고
    • Trusted Computing Group Version 1.2 rev. 103, July
    • Trusted Computing Group. TPM Main Specification, Version 1.2 rev. 103, July 2007. https://www.trustedcomputinggroup.org.
    • (2007) TPM Main Specification


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.