-
1
-
-
20144362635
-
Defining the personal health record
-
AHIMAe-HIM Personal Health Record Work Group
-
AHIMAe-HIM Personal Health Record Work Group (2005) Defining the personal health record. J AHIMA 76(6):24-25
-
(2005)
J AHIMA
, vol.76
, Issue.6
, pp. 24-25
-
-
-
2
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur 4:224-274
-
(2001)
ACM Trans Inf Syst Secur
, vol.4
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
3
-
-
54449095842
-
A research agenda for personal health records (Phrs)
-
Kaelber DC, Jha AK, Johnston D, Middleton B, Bates DW (2008) A research agenda for personal health records (Phrs). J Am Med Inform Assoc 15:729-736
-
(2008)
J Am Med Inform Assoc
, vol.15
, pp. 729-736
-
-
Kaelber, D.C.1
Jha, A.K.2
Johnston, D.3
Middleton, B.4
Bates, D.W.5
-
5
-
-
70350381719
-
-
Accessed 22 Aug 2011
-
Google Inc (2011) "Google Health," http://www.google.com/intl/ zh-TW/health/about/. Accessed 22 Aug 2011
-
(2011)
Google Health
-
-
-
6
-
-
84855537810
-
-
Accessed 22 Aug 2011
-
Microsoft Corporation (2011) "HealthVault," http://www.microsoft.com/en-us/healthvault/. Accessed 22 Aug 2011
-
(2011)
HealthVault
-
-
-
7
-
-
63649117166
-
Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2008) Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599-616
-
(2008)
Future Gener Comput Syst
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
8
-
-
78649686165
-
Cloud computing - A classification, business models, and research directions
-
Weinhardt C, Anandasivam A, Blau B, Borissov N, Meinl T, Michalk W, Stößer J (2009) Cloud computing - a classification, business models, and research directions. Bus Inf Syst Eng 1(5):391-399
-
(2009)
Bus Inf Syst Eng
, vol.1
, Issue.5
, pp. 391-399
-
-
Weinhardt, C.1
Anandasivam, A.2
Blau, B.3
Borissov, N.4
Meinl, T.5
Michalk, W.6
Stößer, J.7
-
9
-
-
79952115227
-
Ethical, legal and social issues for personal health records and applications
-
Cushman R, Froomkin M, Cava A, Abril P, Goodman KW (2010) Ethical, legal and social issues for personal health records and applications. J Biomed Inform 43(5 Supp. 1):S51-S55
-
(2010)
J Biomed Inform
, vol.43
, Issue.5 SUPPL. 1
-
-
Cushman, R.1
Froomkin, M.2
Cava, A.3
Abril, P.4
Goodman, K.W.5
-
10
-
-
67650951127
-
Online data storage using implicit security
-
Parakh A, Kak S (2009) Online data storage using implicit security. Inf Sci 179(19):3323-3333
-
(2009)
Inf Sci
, vol.179
, Issue.19
, pp. 3323-3333
-
-
Parakh, A.1
Kak, S.2
-
11
-
-
4644334031
-
Personal health information management system and its application in referral management
-
Wang M, Lau C, Matsen FA III, Kim Y (2004) Personal health information management system and its application in referral management. IEEE Trans Inf Technol Biomed 8(3):287-297
-
(2004)
IEEE Trans Inf Technol Biomed
, vol.8
, Issue.3
, pp. 287-297
-
-
Wang, M.1
Lau, C.2
Matsen III, F.A.3
Kim, Y.4
-
14
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput App 34:1-11
-
(2011)
J Netw Comput App
, vol.34
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
17
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120-126
-
(1978)
Commun ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
18
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
Advances in cryptology-CRYPTO '85
-
Miller V, (1986) Uses of elliptic curves in cryptography, Advances in cryptology-CRYPTO '85, Lecture Notes in Computer Science 218: 417-426
-
(1986)
Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
19
-
-
0028513932
-
Access control: Principle and practice
-
Sandhu RS, Samarati P (1994) Access control: principle and practice. IEEE Commun Mag 32(9):40-48
-
(1994)
IEEE Commun Mag
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
|