메뉴 건너뛰기




Volumn 6, Issue 6, 2010, Pages 959-964

Suitability of using SOAP protocol to secure electronic medical record databases transmission

Author keywords

Confidentiality; Electronic medical records; Security; SOAP; XML

Indexed keywords


EID: 79955879550     PISSN: 18117775     EISSN: 18125700     Source Type: Journal    
DOI: 10.3923/ijp.2010.959.964     Document Type: Article
Times cited : (52)

References (30)
  • 3
    • 74349117323 scopus 로고    scopus 로고
    • A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm
    • Ahmed, M.A., M.L.M. Kiah, B.B. Zaidan and A. A. Zaidan, 2010. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J. Applied Sci., 10: 59-64.
    • (2010) J. Applied Sci. , vol.10 , pp. 59-64
    • Ahmed, M.A.1    Kiah, M.L.M.2    Zaidan, B.B.3    Zaidan, A.A.4
  • 5
    • 78951479954 scopus 로고    scopus 로고
    • Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study
    • Alam, G.M., M.L.M. Kiah, B.B. Zaidan, A.A. Zaidan and H.O. Alanazi, 2010. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. Sci. Res. Essays, 5: 3254-3260.
    • (2010) Sci. Res. Essays , vol.5 , pp. 3254-3260
    • Alam, G.M.1    Kiah, M.L.M.2    Zaidan, B.B.3    Zaidan, A.A.4    Alanazi, H.O.5
  • 6
    • 78049468900 scopus 로고    scopus 로고
    • Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance
    • Alanazi, H.O., H.A. Jalab, G.M. Alam, B.B. Zaidan and A. A. Zaidan, 2010a. Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance. J. Med. Plants Res., 4: 2059-2074.
    • (2010) J. Med. Plants Res. , vol.4 , pp. 2059-2074
    • Alanazi, H.O.1    Jalab, H.A.2    Alam, G.M.3    Zaidan, B.B.4    Zaidan, A.A.5
  • 11
    • 77954824252 scopus 로고    scopus 로고
    • On the Capacity and security of steganography approaches: An overview
    • Hmood, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B. B. Zaidan, 2010a. On the Capacity and security of steganography approaches: An overview. J. Applied Sci., 10: 1825-1833.
    • (2010) J. Applied Sci. , vol.10 , pp. 1825-1833
    • Hmood, A.K.1    Jalab, H.A.2    Kasirun, Z.M.3    Zaidan, A.A.4    Zaidan, B.B.5
  • 12
    • 77958064851 scopus 로고    scopus 로고
    • On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates
    • Hmood, A.K., Z.M. Kasirun, H.A. Jalab, G.M. Alam, A.A. Zaidan and B.B. Zaidan, 2010b. On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates. Int. J. Phys. Sci., 5: 1054-1062.
    • (2010) Int. J. Phys. Sci. , vol.5 , pp. 1054-1062
    • Hmood, A.K.1    Kasirun, Z.M.2    Jalab, H.A.3    Alam, G.M.4    Zaidan, A.A.5    Zaidan, B.B.6
  • 13
    • 77954829600 scopus 로고    scopus 로고
    • An overview on hiding information technique in images
    • Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab, 2010c. An overview on hiding information technique in images. J. Applied Sci., 10: 2094-2100.
    • (2010) J. Applied Sci. , vol.10 , pp. 2094-2100
    • Hmood, A.K.1    Zaidan, B.B.2    Zaidan, A.A.3    Jalab, H.A.4
  • 14
    • 84959278830 scopus 로고    scopus 로고
    • Evaluating SOAP for high performance business applications: Real-time trading systems
    • May 20-24, Budapest, Hungary
    • Kohlhoff, C. and R. Steele, 2003. Evaluating SOAP for high performance business applications: Real-time trading systems. Proceedings of the WWW 2003, May 20-24, Budapest, Hungary, pp: 1-9.
    • (2003) Proceedings of the WWW 2003 , pp. 1-19
    • Kohlhoff, C.1    Steele, R.2
  • 15
    • 77952268534 scopus 로고    scopus 로고
    • Challenges of hidden data in the unused area two within executable files
    • Naji, A.W., A.A. Zaidan and B.B. Zaidan, 2009. Challenges of hidden data in the unused area two within executable files. J. Comput. Sci., 5: 890-897.
    • (2009) J. Comput. Sci. , vol.5 , pp. 890-897
    • Naji, A.W.1    Zaidan, A.A.2    Zaidan, B.B.3
  • 17
    • 77955146619 scopus 로고    scopus 로고
    • A scalable and secure position-based routing protocol for ad-hoc networks
    • Qabajeh, L.K., M.L.M. Kiah and M.M. Qabajeh, 2009. A scalable and secure position-based routing protocol for ad-hoc networks. Malaysian J. Comput. Sci., 22: 99-120.
    • (2009) Malaysian J. Comput. Sci. , vol.22 , pp. 99-120
    • Qabajeh, L.K.1    Kiah, M.L.M.2    Qabajeh, M.M.3
  • 18
    • 84857780686 scopus 로고    scopus 로고
    • Impact of spam advertisement through email: A study to assess the influence of the anti-spam on the email marketing
    • Raad, M., N.M. Yeasin, G.M. Alam, B.B. Zaidan and A. A. Zaidan, 2010. Impact of spam advertisement through email: A study to assess the influence of the anti-spam on the email marketing. Afr. J. Bus. Manage., 4: 2362-2367.
    • (2010) Afr. J. Bus. Manage. , vol.4 , pp. 2362-2367
    • Raad, M.1    Yeasin, N.M.2    Alam, G.M.3    Zaidan, B.B.4    Zaidan, A.A.5
  • 20
    • 78650269547 scopus 로고    scopus 로고
    • Shoulder surfing resistance using penup event and neighbouring connectivity manipulation
    • Yee, P.L. and M.L.M. Kiah, 2010. Shoulder surfing resistance using penup event and neighbouring connectivity manipulation. Malaysian J. Comput. Sci., 23: 121-140.
    • (2010) Malaysian J. Comput. Sci. , vol.23 , pp. 121-140
    • Yee, P.L.1    Kiah, M.L.M.2
  • 21
    • 77954826595 scopus 로고    scopus 로고
    • Investigate the capability of applying hidden data in text file: An overview
    • Zaidan, A.A., B.B. Zaidan, A.K. Al-Fraja and H.A. Jalab, 2010a. Investigate the capability of applying hidden data in text file: An overview. J. Applied Sci., 10: 1916-1922.
    • (2010) J. Applied Sci. , vol.10 , pp. 1916-1922
    • Zaidan, A.A.1    Zaidan, B.B.2    Al-Fraja, A.K.3    Jalab, H.A.4
  • 22
    • 77954833269 scopus 로고    scopus 로고
    • An overview: Theoretical and mathematical perspectives for advance enciyption standard/rijndael
    • Zaidan, A.A., B.B. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010b. An overview: Theoretical and mathematical perspectives for advance enciyption standard/rijndael. J. Applied Sci., 10: 2161-2167.
    • (2010) J. Applied Sci. , vol.10 , pp. 2161-2167
    • Zaidan, A.A.1    Zaidan, B.B.2    Al-Frajat, A.K.3    Jalab, H.A.4
  • 23
    • 77957325769 scopus 로고    scopus 로고
    • Novel approach for high (secure and rate) data hidden within triplex space for non multimedia file
    • Zaidan, A.A., B.B. Zaidan, H.O. Alanazi, A. Gani, O. Zakaria and G.M. Alam, 2010c. Novel approach for high (secure and rate) data hidden within triplex space for non multimedia file. Sci. Res. Essays, 5: 1965-1977.
    • (2010) Sci. Res. Essays , vol.5 , pp. 1965-1977
    • Zaidan, A.A.1    Zaidan, B.B.2    Alanazi, H.O.3    Gani, A.4    Zakaria, O.5    Alam, G.M.6
  • 24
    • 78649273195 scopus 로고    scopus 로고
    • Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem
    • Zaidan, A.A., B.B. Zaidan, A.Y. Taqa, K.M.S. Mustafa, G.M. Alam and H.A. Jalab, 2010 Od. Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem. Int. J. Phys. Sci., 5: 1992-2000.
    • (2010) Int. J. Phys. Sci. , vol.5 , pp. 1992-2000
    • Zaidan, A.A.1    Zaidan, B.B.2    Taqa, A.Y.3    Mustafa, K.M.S.4    Alam, G.M.5    Jalab, H.A.6
  • 25
    • 77954783981 scopus 로고    scopus 로고
    • On the differences between hiding information and cryptography techniques: An overview
    • Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010e. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
    • (2010) J. Applied Sci. , vol.10 , pp. 1650-1655
    • Zaidan, B.B.1    Zaidan, A.A.2    Al-Frajat, A.K.3    Jalab, H.A.4
  • 26
    • 78649299082 scopus 로고    scopus 로고
    • StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem
    • Zaidan, B.B., A.A. Zaidan, A. Taqa, G.M. Alam, M.L.M. Kiah and H.A. Jalab, 2010f. StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem. Int. J. Phys. Sci., 5: 1796-1806.
    • (2010) Int. J. Phys. Sci. , vol.5 , pp. 1796-1806
    • Zaidan, B.B.1    Zaidan, A.A.2    Taqa, A.3    Alam, G.M.4    Kiah, M.L.M.5    Jalab, H.A.6
  • 27
    • 78651075908 scopus 로고    scopus 로고
    • A new hybrid module for skin detector using fuzzy inference system structure and explicit rules
    • (In Press)
    • Zaidan, A.A., H.A. Karim, N.N. Ahmed, G.M. Alam and B.B. Zaidan, 2010g. A new hybrid module for skin detector using fuzzy inference system structure and explicit rules. Int. J. Phys. Sci., (In Press).
    • (2010) Int. J. Phys. Sci.
    • Zaidan, A.A.1    Karim, H.A.2    Ahmed, N.N.3    Alam, G.M.4    Zaidan, B.B.5
  • 28
    • 78649415172 scopus 로고    scopus 로고
    • Increase reliability for skin detector using backprobgation neural network and heuristic rules based on YCbCr
    • Zaidan, A.A., N.N. Ahmed, H.A. Karim, G.M. Alam and B.B. Zaidan, 2010h. Increase reliability for skin detector using backprobgation neural network and heuristic rules based on YCbCr. Sci. Res. Essays, 5: 2931-2946.
    • (2010) Sci. Res. Essays , vol.5 , pp. 2931-2946
    • Zaidan, A.A.1    Ahmed, N.N.2    Karim, H.A.3    Alam, G.M.4    Zaidan, B.B.5
  • 29
    • 78751500455 scopus 로고    scopus 로고
    • A novel hybrid module of skin detector using grouping histogram technique for bayesian method and segment skin adjacent-nested technique for neural network
    • (In Press)
    • Zaidan, A.A., H.A. Karim, N.N. Ahmed, G.M. Alam and B.B. Zaidan, 2010i. A novel hybrid module of skin detector using grouping histogram technique for bayesian method and segment skin adjacent-nested technique for neural network. Int. J. Phys. Sci., (In Press).
    • (2010) Int. J. Phys. Sci.
    • Zaidan, A.A.1    Karim, H.A.2    Ahmed, N.N.3    Alam, G.M.4    Zaidan, B.B.5
  • 30
    • 78751509177 scopus 로고    scopus 로고
    • Spam influence on the business and economy: Theoretical and experimental study for textual anti-spam filtering using mature document processing and naïve bayesian classifier
    • (In Press)
    • Zaidan, A.A., N.N. Ahmed, H.A. Karim, G.M. Alam and B.B. Zaidan, 2010j. Spam influence on the business and economy: theoretical and experimental study for textual anti-spam filtering using mature document processing and naïve bayesian classifier. Afr. J. Bus. Manage., (In Press).
    • (2010) Afr. J. Bus. Manage.
    • Zaidan, A.A.1    Ahmed, N.N.2    Karim, H.A.3    Alam, G.M.4    Zaidan, B.B.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.