-
1
-
-
49049117866
-
Privacy aspects of eHealth
-
IEEE, March
-
D. Slamanig and C. Stingl, "Privacy Aspects of eHealth," in Proc. of ARES '08. IEEE, March 2008, pp. 1226-1233.
-
(2008)
Proc. of ARES '08
, pp. 1226-1233
-
-
Slamanig, D.1
Stingl, C.2
-
2
-
-
63849337073
-
Improving Korean service delivery system in health care: Focusing on national E-health system
-
IEEE
-
H. J. Cheong, N. Y. Shin, and Y. B. Joeng, "Improving Korean Service Delivery System in Health Care: Focusing on National E-health System," in Proc. of eTELEMED '09. IEEE, 2009, pp. 263-268.
-
(2009)
Proc. of ETELEMED '09
, pp. 263-268
-
-
Cheong, H.J.1
Shin, N.Y.2
Joeng, Y.B.3
-
4
-
-
77953145867
-
-
June
-
"Canada Health Infoway," http://www.infoway-inforoute.ca, June 2009.
-
(2009)
Canada Health Infoway
-
-
-
5
-
-
77957861043
-
-
World Health Organization Press, Report for the World Summit on the Information Society
-
J. Dzenowagis and G. Kernen, "Global vision, local insight," World Health Organization Press, Report for the World Summit on the Information Society, 2005.
-
(2005)
Global Vision, Local Insight
-
-
Dzenowagis, J.1
Kernen, G.2
-
7
-
-
80053161588
-
Japan: Emerging eHealth
-
March
-
"Japan: Emerging eHealth," SCRIP Magazine, pp. 21-24, March 2002.
-
(2002)
SCRIP Magazine
, pp. 21-24
-
-
-
8
-
-
77957968012
-
Security models and requirements for healthcare application clouds
-
IEEE
-
R. Zhang and L. Liu, "Security Models and Requirements for Healthcare Application Clouds," in Proc of CLOUD '10. IEEE, 2010, pp. 268-275.
-
(2010)
Proc of CLOUD '10
, pp. 268-275
-
-
Zhang, R.1
Liu, L.2
-
9
-
-
77952193706
-
A cloud computing solution for patient data collection in health care institutions
-
IEEE
-
C. Rolim, F. Koch, C. Westphall, J. Werner, A. Fracalossi, G. Salvador, "A Cloud Computing Solution for Patient Data Collection in Health Care Institutions," in Proc. of ETELEMED. IEEE, 2010, pp. 95-99.
-
(2010)
Proc. of ETELEMED
, pp. 95-99
-
-
Rolim, C.1
Koch, F.2
Westphall, C.3
Werner, J.4
Fracalossi, A.5
Salvador, G.6
-
10
-
-
80053143611
-
Analysis of information governance and patient data protection within primary health care
-
To appear
-
M. Smith, W. Buchanan, C. Thuemmler, D. Bell and R. Hazelhoff, "Analysis of Information Governance and Patient Data Protection within Primary Health Care," To appear in Int. J. for Quality in Health Care.
-
Int. J. for Quality in Health Care
-
-
Smith, M.1
Buchanan, W.2
Thuemmler, C.3
Bell, D.4
Hazelhoff, R.5
-
11
-
-
67349253018
-
Sage: A strong privacy-preserving scheme against global eavesdropping for eHealth systems
-
May
-
X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "Sage: a Strong Privacy-preserving Scheme Against Global Eavesdropping for eHealth Systems," IEEE J-SAC, vol. 27, no. 4, pp. 365-378, May 2009.
-
(2009)
IEEE J-SAC
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu, R.2
Shen, X.3
Nemoto, Y.4
Kato, N.5
-
12
-
-
72949085732
-
An evaluation of technologies for the pseudonymization of medical data
-
ACM
-
T. Neubauer and A. Ekelhart, "An Evaluation of Technologies for the Pseudonymization of Medical Data," in Proc. of SAC '09. ACM, 2009.
-
(2009)
Proc. of SAC '09
-
-
Neubauer, T.1
Ekelhart, A.2
-
13
-
-
2942683823
-
-
IBM Redbooks, July
-
M. Endrei, J. Ang, A. Arsanjani, S. Chua, P. Comte, P. Krogdahl, M. Luo, and T. Newling, Patterns: Service-Oriented Architecture and Web Services. IBM Redbooks, July 2004.
-
(2004)
Patterns: Service-oriented Architecture and Web Services
-
-
Endrei, M.1
Ang, J.2
Arsanjani, A.3
Chua, S.4
Comte, P.5
Krogdahl, P.6
Luo, M.7
Newling, T.8
-
14
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
January
-
L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, "A Break in the Clouds: Towards a Cloud Definition," ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, January 2009.
-
(2009)
ACM SIGCOMM Computer Communication Review
, vol.39
, Issue.1
, pp. 50-55
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
15
-
-
78649899214
-
The characteristics of cloud computing
-
IEEE
-
C. Gong, J. Liu, Q. Zhang, H. Chen, and Z. Gong, "The Characteristics of Cloud Computing," in Proc of SCC '10. IEEE, 2010, pp. 275-279.
-
(2010)
Proc of SCC '10
, pp. 275-279
-
-
Gong, C.1
Liu, J.2
Zhang, Q.3
Chen, H.4
Gong, Z.5
-
16
-
-
70349456218
-
Virtual infrastructure management in private and hybrid clouds
-
B. Sotomayor, R. Montero, I. Llorente, and I. Foster, "Virtual Infrastructure Management in Private and Hybrid Clouds," Internet Computing, vol. 13, no. 5, pp. 14-22, 2009.
-
(2009)
Internet Computing
, vol.13
, Issue.5
, pp. 14-22
-
-
Sotomayor, B.1
Montero, R.2
Llorente, I.3
Foster, I.4
-
17
-
-
77957934070
-
Cost-optimal scheduling in hybrid IaaS clouds for deadline constrained workloads
-
IEEE
-
R. V. den Bossche, K. Vanmechelen, and J. Broeckhove, "Cost-Optimal Scheduling in Hybrid IaaS Clouds for Deadline Constrained Workloads," in Proc. of CLOUD '10. IEEE, 2010, pp. 228-235.
-
(2010)
Proc. of CLOUD '10
, pp. 228-235
-
-
Den Bossche, R.V.1
Vanmechelen, K.2
Broeckhove, J.3
-
18
-
-
74049112206
-
Cloud security issues
-
IEEE
-
B. Kandukuri, V. Paturi, and A. Rakshit, "Cloud Security Issues," in Proc. of SCC '09. IEEE, 2009, pp. 517-520.
-
(2009)
Proc. of SCC '09
, pp. 517-520
-
-
Kandukuri, B.1
Paturi, V.2
Rakshit, A.3
-
19
-
-
0003535504
-
Remote authentication dial in user service
-
June
-
C. Rigney, S. Willens, A. Rubens, and W. Simpson, "Remote Authentication Dial In User Service," IETF standards RFC 2865, June 2000.
-
(2000)
IETF Standards RFC 2865
-
-
Rigney, C.1
Willens, S.2
Rubens, A.3
Simpson, W.4
-
21
-
-
41949093741
-
-
OpenID Foundation, December
-
"OpenID Authentication 2.0," OpenID Foundation, December 2007.
-
(2007)
OpenID Authentication 2.0
-
-
-
23
-
-
70449504111
-
SOAP version 1.2 Part 1: Messaging framework (Second edition)
-
April
-
M. Gudgin, M. Hadley, N. Mendelsohn, J.-J. Moreau, H. F. Nielsen, A. Karmarkar, and Y. Lafon, "SOAP Version 1.2 Part 1: Messaging Framework (Second Edition)," W3C Recommendation, April 2007.
-
(2007)
W3C Recommendation
-
-
Gudgin, M.1
Hadley, M.2
Mendelsohn, N.3
Moreau, J.-J.4
Nielsen, H.F.5
Karmarkar, A.6
Lafon, Y.7
-
25
-
-
80053161770
-
-
US Patent: 61/116681, UK Patent: 0816556.5, Nov
-
J. Graves, B. Buchanan, and N. Bose, "DNA Digital Fingerprinting Framework," US Patent: 61/116681, UK Patent: 0816556.5, Nov 2009.
-
(2009)
DNA Digital Fingerprinting Framework
-
-
Graves, J.1
Buchanan, B.2
Bose, N.3
-
26
-
-
62549134021
-
Radio frequency identification (RFID) in pervasive healthcare
-
C. Thuemmler, W. Buchanan, and A. Lawson, "Radio Frequency Identification (RFID) in Pervasive Healthcare," Int. J. of Healthcare Technology and Management, vol. 10, pp. 119-131, 2009.
-
(2009)
Int. J. of Healthcare Technology and Management
, vol.10
, pp. 119-131
-
-
Thuemmler, C.1
Buchanan, W.2
Lawson, A.3
-
27
-
-
70450170255
-
The application/json media type for JavaScript object notation (JSON)
-
July
-
D. Crockford, "The application/json Media Type for JavaScript Object Notation (JSON)," IETF standards RFC 4627, July 2006.
-
(2006)
IETF Standards RFC 4627
-
-
Crockford, D.1
-
31
-
-
77957887595
-
An XML-based framework for automating data exchange in healthcare
-
IEEE
-
H. Jumaa, P. Rubel, and J. Fayn, "An XML-based Framework for Automating Data Exchange in Healthcare," in Proc. of Healthcom '10. IEEE, 2010, pp. 264-269.
-
(2010)
Proc. of Healthcom '10
, pp. 264-269
-
-
Jumaa, H.1
Rubel, P.2
Fayn, J.3
-
32
-
-
77952383756
-
Model-driven application-level encryption for the privacy of E-health data
-
IEEE
-
Y. Ding and K. Klein, "Model-Driven Application-Level Encryption for the Privacy of E-health Data," in Proc. of ARES '10. IEEE, 2010, pp. 341-346.
-
(2010)
Proc. of ARES '10
, pp. 341-346
-
-
Ding, Y.1
Klein, K.2
-
33
-
-
70449601796
-
Resource leasing and the art of suspending virtual machines
-
IEEE Computer Society
-
B. Sotomayor, R. S. Montero, I. M. Llorente, and I. Foster, "Resource Leasing and the Art of Suspending Virtual Machines," in Proc. of HiPC '09. IEEE Computer Society, 2009, pp. 59-68.
-
(2009)
Proc. of HiPC '09
, pp. 59-68
-
-
Sotomayor, B.1
Montero, R.S.2
Llorente, I.M.3
Foster, I.4
-
34
-
-
77953146649
-
Providing interoperability of eHealth communities through peer-to-peer networks
-
O. Kilic, A. Dogac, and M. Eichelberg, "Providing Interoperability of eHealth Communities Through Peer-to-Peer Networks," IEEE TITB, vol. 14, no. 3, pp. 846-853, 2010.
-
(2010)
IEEE TITB
, vol.14
, Issue.3
, pp. 846-853
-
-
Kilic, O.1
Dogac, A.2
Eichelberg, M.3
-
35
-
-
1542267916
-
E-consent: The design and implementation of consumer consent mechanisms in an electronic environment
-
DOI 10.1197/jamia.M1480
-
E. Coiera and R. Clarke, "e-Consent: the Design and Implementation of Consumer Consent Mechanism in an Electronic Environment," Journal of the American Medical Informatics Association, vol. 11, no. 2, pp. 129-140, 2004. (Pubitemid 38327502)
-
(2004)
Journal of the American Medical Informatics Association
, vol.11
, Issue.2
, pp. 129-140
-
-
Coiera, E.1
Clarke, R.2
-
36
-
-
77952175894
-
E-CRL: A rule-based language for expressing patient electronic consent
-
IEEE
-
C. Pruski, "e-CRL: A Rule-Based Language for Expressing Patient Electronic Consent," in Proc of ETELEMED. IEEE, 2010, pp. 141-146.
-
(2010)
Proc of ETELEMED
, pp. 141-146
-
-
Pruski, C.1
-
37
-
-
79958703905
-
Novel information sharing syntax for data sharing between police and community partners, using role-based security
-
IEEE
-
O. Uthmani, W. Buchanan, A. Lawson, and C. Thuemmler, "Novel Information Sharing Syntax for Data Sharing Between Police and Community Partners, Using Role-Based Security," in Proc. of ECIW '10. IEEE, 2010, pp. 394-402.
-
(2010)
Proc. of ECIW '10
, pp. 394-402
-
-
Uthmani, O.1
Buchanan, W.2
Lawson, A.3
Thuemmler, C.4
-
38
-
-
80053135669
-
Interagency data exchange protocols as computational data protection law
-
December
-
B. Buchanan, L. Fan, A. Lawson, R. Scott, B. Schafer, C. Tuemmler, and O. Uthmani, "Interagency Data Exchange Protocols as Computational Data Protection Law," Legal Knowledge and Information Systems, vol. 223, pp. 243-147, December 2010.
-
(2010)
Legal Knowledge and Information Systems
, vol.223
, pp. 243-147
-
-
Buchanan, B.1
Fan, L.2
Lawson, A.3
Scott, R.4
Schafer, B.5
Tuemmler, C.6
Uthmani, O.7
-
39
-
-
78349273296
-
A semantic based methodology to classify and protect sensitive data in medical records
-
IEEE
-
F. Amato, V. Casola, A. Mazzeo, and S. Romano, "A Semantic Based Methodology to Classify and Protect Sensitive Data in Medical Records," in Proc. of IAS '10. IEEE, 2010, pp. 240-246.
-
(2010)
Proc. of IAS '10
, pp. 240-246
-
-
Amato, F.1
Casola, V.2
Mazzeo, A.3
Romano, S.4
|