메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Managing security and privacy in ubiquitous eHealth information interchange

Author keywords

Goal centric risk mitigation; Purpose driven policies; Sensitivity metatags; Ubiquitous eHealth; Vulnerability points

Indexed keywords

EHEALTH; META-TAGS; PURPOSE-DRIVEN POLICIES; RISK MITIGATION; VULNERABILITY POINTS;

EID: 79955982545     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1968613.1968645     Document Type: Conference Paper
Times cited : (28)

References (30)
  • 5
    • 79956045278 scopus 로고    scopus 로고
    • Available from CNN over the Internet, Oct.
    • CNN. 911 Caller Ignored, Killed. Available from CNN over the Internet, Oct. 2010. http://www.cnn.com/video/#/video/us/2008/05/02/.
    • (2010) 911 Caller Ignored, Killed
  • 6
    • 80053144839 scopus 로고    scopus 로고
    • P. C. I. Council. Available over the Internet - July
    • P. C. I. Council. Payment card industry (pci) data security standard. Available over the Internet - July 2010. https://www.pcisecuritystandards.org.
    • (2010) Payment Card Industry (Pci) Data Security Standard
  • 8
    • 0001809810 scopus 로고    scopus 로고
    • The ponder policy specification language
    • Bristol, U.K. Springer-Verlag, LNCS, Jan.
    • N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. Policy Workshop 2001, Bristol, U.K., Springer-Verlag, LNCS, Jan. 2001.
    • (2001) Policy Workshop 2001
    • Damianou, N.1    Dulay, N.2    Lupu, E.3    Sloman, M.4
  • 9
    • 4544341979 scopus 로고
    • The last link: Default = offine, or why ubicomp scares me
    • Oct.
    • S. Doheny-Farina. The Last Link: Default = Offine, Or Why Ubicomp Scares Me. Computer-mediated Communication, 1(6):18-20, Oct. 1994.
    • (1994) Computer-mediated Communication , vol.1 , Issue.6 , pp. 18-20
    • Doheny-Farina, S.1
  • 12
    • 4544226510 scopus 로고
    • Why do people wear active badges?
    • Rank Xerox, Cambridge, MA
    • R. H. R. Harper. Why Do People Wear Active Badges? Technical Report EPC-1993-120, Rank Xerox, Cambridge, MA, 1993.
    • (1993) Technical Report EPC-1993-120
    • Harper, R.H.R.1
  • 13
    • 77958580542 scopus 로고    scopus 로고
    • Available from Health and Human Services Department over the Internet - July
    • HHS. Hipaa privacy rule. Available from Health and Human Services Department over the Internet - July 2010. www.hhs.gov/ocr/privacy/hipaa/ administrative/privacyrule/index.html.
    • (2010) Hipaa Privacy Rule
  • 15
    • 84945556728 scopus 로고    scopus 로고
    • Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
    • Ubicomp 2001: Ubiquitous Computing
    • M. Langheinrich. Privacy by Design - Principles of Privacy-aware Ubiquitous Systems. In Proc. Inter'l Conference on Ubiquitous Computing, pages 273-291, Gresham College, London, 2001. (Pubitemid 33347314)
    • (2001) Lecture Notes in Computer Science , Issue.2201 , pp. 273-291
    • Langheinrich, M.1
  • 24
    • 79956044854 scopus 로고    scopus 로고
    • Security issues in ubiquitous computing
    • H. Nakashima, H. Aghajan, J. C. Augusto (Eds.), Springer
    • F. Stajano. Security Issues in Ubiquitous Computing. In H. Nakashima, H. Aghajan, J. C. Augusto (Eds.). Handbook of Ambient Intelligence and Smart Environments, Springer 2010.
    • (2010) Handbook of Ambient Intelligence and Smart Environments
    • Stajano, F.1
  • 25
    • 0041595778 scopus 로고    scopus 로고
    • Pervasive health care applications face tough security challenges
    • April-June
    • V. Stanford. Pervasive Health Care Applications Face Tough Security Challenges. IEEE Pervasive Computing, 8(12), April-June 2002.
    • (2002) IEEE Pervasive Computing , vol.8 , Issue.12
    • Stanford, V.1
  • 26
    • 72949123722 scopus 로고    scopus 로고
    • Extending problem frames to deal with stakeholder problems: An agent- and goal-oriented approach
    • Honolulu, Hawai, Mar. 9-12
    • S. Supakkul and L. Chung. Extending Problem Frames to Deal with Stakeholder Problems: An Agent- and Goal-Oriented Approach. In Proc. of the 24th ACM Symposium on Applied Computing (RE Track), pages 389-394, Honolulu, Hawai, Mar. 9-12 2006.
    • (2006) Proc. of the 24th ACM Symposium on Applied Computing (RE Track) , pp. 389-394
    • Supakkul, S.1    Chung, L.2
  • 28
    • 33646711912 scopus 로고    scopus 로고
    • Security aspects of ubiquitous computing in health care
    • DOI 10.1007/s00502-006-0336
    • E. Weippl, A. Holzinger, and A. Tjoa. Security Aspects of Ubiquitous Computing in Health Care. E&I Journal, pages 156-161, 2006. (Pubitemid 43734490)
    • (2006) Elektrotechnik und Informationstechnik , vol.123 , Issue.4 , pp. 156-161
    • Weippl, E.1    Holzinger, A.2    Tjoa, A.M.3
  • 29
    • 84942211371 scopus 로고
    • Hot topics: Ubiquitous computing
    • Oct.
    • M. Weiser. Hot Topics: Ubiquitous Computing. IEEE Computer, pages 71-72, Oct. 1993.
    • (1993) IEEE Computer , pp. 71-72
    • Weiser, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.