메뉴 건너뛰기




Volumn 23, Issue 16, 2011, Pages 1857-1867

EMOLST: A documentation flow for distributed health informatics

Author keywords

distributed system; health informatics; workflow

Indexed keywords

AUTHENTICATION; DISTRIBUTED DATABASE SYSTEMS; LARGE SCALE SYSTEMS; MEDICAL INFORMATICS; PATIENT TREATMENT; PORTALS; WORK SIMPLIFICATION;

EID: 80053557137     PISSN: 15320626     EISSN: 15320634     Source Type: Journal    
DOI: 10.1002/cpe.1745     Document Type: Conference Paper
Times cited : (9)

References (22)
  • 1
    • 80053545332 scopus 로고    scopus 로고
    • Excellus BlueCross, and New York State Department of Health
    • Health Form, August
    • Bomba P,. Excellus BlueCross, and New York State Department of Health. Molst-Medical orders for life-sustaining treatment. Health Form, August 2008.
    • (2008) Molst-Medical Orders for Life-sustaining Treatment
    • Bomba, P.1
  • 2
    • 77749269193 scopus 로고    scopus 로고
    • Technical Report, Software Research and Development Center, Middle East Technical University, Ankara, Turkey, December
    • Dogac A, Namli T,. Implementation experiences on ihe xua and bppc. Technical Report, Software Research and Development Center, Middle East Technical University, Ankara, Turkey, December 2006.
    • (2006) Implementation Experiences on Ihe Xua and Bppc
    • Dogac, A.1    Namli, T.2
  • 3
    • 63849319193 scopus 로고    scopus 로고
    • A workflow solution for electronic health records to improve healthcare delivery efficiency in rural India
    • Koppar AR, Sridhar V,. A workflow solution for electronic health records to improve healthcare delivery efficiency in rural India. eTELEMED, Cancun, Mexico, 2009; 227-232.
    • (2009) ETELEMED, Cancun, Mexico , pp. 227-232
    • Koppar, A.R.1    Sridhar, V.2
  • 5
    • 80052315881 scopus 로고    scopus 로고
    • Temporal dependency based checkpoint selection for dagoynamic verification of temporal constraints in scientific workflow systems
    • Available at: [17 June ]
    • Chen J, Yang Y,. Temporal dependency based checkpoint selection for dagoynamic verification of temporal constraints in scientific workflow systems. ACM Transactions on Software Engineering and Methodology 2009. Available at: http://www.swinflow.org/papers/TOSEM.pdf [17 June 2009 ].
    • (2009) ACM Transactions on Software Engineering and Methodology 2009
    • Chen, J.1    Yang, Y.2
  • 6
    • 70349916404 scopus 로고    scopus 로고
    • Trust-based robust scheduling and runtime adaptation of scientific workflow
    • Wiley: New York, ISSN: 1532-0626.
    • Wang M, Kotagiri R, Chen J,. Trust-based robust scheduling and runtime adaptation of scientific workflow. Concurrency and Computation: Practice and Experience. Wiley: New York, 2009; 1982-1998. ISSN: 1532-0626.
    • (2009) Concurrency and Computation: Practice and Experience , pp. 1982-1998
    • Wang, M.1    Kotagiri, R.2    Chen, J.3
  • 8
    • 36748999441 scopus 로고    scopus 로고
    • Implementation and performance evaluation of the parallel CORBA application on computational grids
    • DOI 10.1016/j.advengsoft.2007.02.001, PII S0965997807000439
    • Wang L,. Implementation and performance evaluation of the parallel corba application on computational grids. Advances in Engineering Software 2008; 39 (3): 211-218. (Pubitemid 350213399)
    • (2008) Advances in Engineering Software , vol.39 , Issue.3 , pp. 211-218
    • Wang, L.1
  • 9
    • 80053480260 scopus 로고    scopus 로고
    • Excellus BlueCross, and New York State Department of Health
    • Health Form, August
    • Bomba P,. Excellus BlueCross, and New York State Department of Health. Molst-Supplemental documentation form for adults. Health Form, August 2008.
    • (2008) Molst-Supplemental Documentation Form for Adults
    • Bomba, P.1
  • 11
    • 41949086982 scopus 로고    scopus 로고
    • The venn of identity: Options and issues in federated identity management
    • DOI 10.1109/MSP.2008.50, 4480459
    • Maler E, Reed D,. The venn of identity: Options and issues in federated identity management. IEEE Security & Privacy 2008; 6 (2): 16-23. (Pubitemid 351506252)
    • (2008) IEEE Security and Privacy , vol.6 , Issue.2 , pp. 16-23
    • Maler, E.1    Reed, D.2
  • 14
    • 80053523366 scopus 로고    scopus 로고
    • IHE International Technical Report, IHE International, December
    • IHE International. Ihe it infrastructure (iti) technical framework. Technical Report, IHE International, December 2008.
    • (2008) Ihe It Infrastructure (Iti) Technical Framework
  • 16
    • 44149084292 scopus 로고    scopus 로고
    • The security limitations of SSO in OpenID
    • DOI 10.1109/ICACT.2008.4494089, 4494089, 10th International Conference on Advanced Communication Technology, ICACT 2008 - Proceedings
    • Oh H-K, Jin S-H,. The security limitations of sso in openid. 10th International Conference on Advanced Communication Technology, ICACT'08, Gangwon-Do, South Korea, vol. 3, 2008; 1608-1611. (Pubitemid 351714829)
    • (2008) International Conference on Advanced Communication Technology, ICACT , vol.3 , pp. 1608-1611
    • Oh, H.-K.1    Jin, S.-H.2
  • 19
    • 51149119089 scopus 로고    scopus 로고
    • Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption
    • Chevalier Y, Küsters R, Rusinowitch M, Turuani M,. Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption. ACM Transactions on Computational Logic 2008; 9 (4): 1-52.
    • (2008) ACM Transactions on Computational Logic , vol.9 , Issue.4 , pp. 1-52
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 21
    • 63349109294 scopus 로고    scopus 로고
    • Establishing trust management in an open source collaborative information repository: An emergency response information system case study
    • Eryilmaz E, Cochran M, Kasemvilas S,. Establishing trust management in an open source collaborative information repository: An emergency response information system case study. HICSS, Waikoloa, Big Island, HI, U.S.A., 2009; 1-10.
    • (2009) HICSS, Waikoloa, Big Island, HI, U.S.A , pp. 1-10
    • Eryilmaz, E.1    Cochran, M.2    Kasemvilas, S.3
  • 22
    • 70249099523 scopus 로고    scopus 로고
    • Using web service enhancements to establish trust relationships with privacy protection (extended and invited from icws 2006 with id 47)
    • Weaver AC, Wu Z,. Using web service enhancements to establish trust relationships with privacy protection (extended and invited from icws 2006 with id 47). International Journal of Web Services Research 2009; 6 (1): 49-68.
    • (2009) International Journal of Web Services Research , vol.6 , Issue.1 , pp. 49-68
    • Weaver, A.C.1    Wu, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.