-
2
-
-
84857737762
-
-
CONNECT Community Portal. http://www.connectopensource.org/.
-
-
-
-
3
-
-
84857696634
-
-
Direct Project. http://wiki.directproject.org/.
-
-
-
-
4
-
-
84857724241
-
-
HealthVault Message Center. http://www.healthvault.com/messagecenter.
-
-
-
-
5
-
-
84857750884
-
-
Master Patient Index (MPI). http://healthinformatics.wikispaces.com/ Master+Patient+Index.
-
-
-
-
6
-
-
84857697903
-
-
Meaningful Use Announcement. http://healthit.hhs.gov/portal/server.pt/ community/healthit-hhs-gov-meaningful-use-announcement/2996.
-
-
-
-
7
-
-
84857722890
-
-
Medical Identity Theft. http://www.ftc.gov/bcp/edu/pubs/consumer/idtheft/ idt10.shtm.
-
-
-
-
8
-
-
84857740186
-
-
Microsoft HealthVault. http://healthvault.com/.
-
-
-
-
9
-
-
84857774315
-
-
Nationwide Health Information Network (NHIN). http://www.hhs.gov/ healthit/healthnetwork/background/.
-
-
-
-
10
-
-
84857730955
-
-
Notice of Proposed Rulemaking to Implement HITECH Act Modifications. http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/hitechnprm. html.
-
-
-
-
11
-
-
84857721779
-
-
The Architecture for Privacy in a Networked Health Information Environment. http://www.markle.org/sites/default/files/P1-CFH-Architecture.pdf.
-
-
-
-
12
-
-
84857742213
-
-
National Ambulatory Medical Care Survey: 2008 Summary Tables. http://www.cdc.gov/nchs/data/ahcd/namcs-summary/namcssum2008.pdf, 2008.
-
(2008)
-
-
-
13
-
-
78650963512
-
MeD-Lights: A usable metaphor for patient controlled access to electronic health records
-
ACM
-
E. Adams, M. Intwala, and A. Kapadia. MeD-Lights: a usable metaphor for patient controlled access to electronic health records. In Proceedings of ACM IHI 2010, pages 800-808. ACM, 2010.
-
(2010)
Proceedings of ACM IHI 2010
, pp. 800-808
-
-
Adams, E.1
Intwala, M.2
Kapadia, A.3
-
15
-
-
0003400251
-
Secure computer system: Unified exposition and multics interpretation
-
MA
-
D. Bell. Secure computer system: Unified exposition and multics interpretation. Technical report, MITRE CORP BEDFORD MA, 1976.
-
(1976)
Technical Report MITRE CORP BEDFORD
-
-
Bell, D.1
-
16
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
D. Bell and L. LaPadula. Secure computer systems: Mathematical foundations and model. MITRE CORP BEDFORD MA, 1(M74-244), 1973.
-
(1973)
MITRE CORP BEDFORD MA
, vol.1
, Issue.M74-244
-
-
Bell, D.1
Lapadula, L.2
-
17
-
-
74049110390
-
Patient controlled encryption: Ensuring privacy of electronic medical records
-
ACM
-
J. Benaloh, M. Chase, E. Horvitz, and K. Lauter. Patient controlled encryption: ensuring privacy of electronic medical records. In Proceedings of CCSW 2009, pages 103-114. ACM, 2009.
-
(2009)
Proceedings of CCSW 2009
, pp. 103-114
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
18
-
-
0003400255
-
Integrity considerations for secure computer systems
-
MA
-
K. Biba. Integrity considerations for secure computer systems. Technical report, MITRE CORP BEDFORD MA, 1977.
-
(1977)
Technical Report MITRE CORP BEDFORD
-
-
Biba, K.1
-
19
-
-
35048901123
-
Public key encryption with keyword search
-
Springer
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In Advances in Cryptology-Eurocrypt 2004, pages 506-522. Springer, 2004.
-
(2004)
Advances in Cryptology-Eurocrypt 2004
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
21
-
-
71549153479
-
A secure channel free public key encryption with keyword search scheme without random oracle
-
L. Fang, W. Susilo, C. Ge, and J. Wang. A secure channel free public key encryption with keyword search scheme without random oracle. Cryptology and Network Security, pages 248-258, 2009.
-
(2009)
Cryptology and Network Security
, pp. 248-258
-
-
Fang, L.1
Susilo, W.2
Ge, C.3
Wang, J.4
-
22
-
-
74049112611
-
Securing medical records on smart phones
-
ACM
-
R. Gardner, S. Garera, M. Pagano, M. Green, and A. Rubin. Securing medical records on smart phones. In Proceedings of SPIMACS 2009, pages 31-40. ACM, 2009.
-
(2009)
Proceedings of SPIMACS 2009
, pp. 31-40
-
-
Gardner, R.1
Garera, S.2
Pagano, M.3
Green, M.4
Rubin, A.5
-
23
-
-
79955951203
-
Keypad: An auditing file system for theft-prone devices
-
R. Geambasu, J. John, S. Gribble, T. Kohno, and H. Levy. Keypad: An Auditing File System for Theft-Prone Devices. In Proceedings of EuroSys 2011, 2011.
-
(2011)
Proceedings of EuroSys 2011
-
-
Geambasu, R.1
John, J.2
Gribble, S.3
Kohno, T.4
Levy, H.5
-
24
-
-
77954942438
-
An architecture for enforcing end-to-end access control over web applications
-
ACM
-
B. Hicks, S. Rueda, D. King, T. Moyer, J. Schiffman, Y. Sreenivasan, P. McDaniel, and T. Jaeger. An architecture for enforcing end-to-end access control over web applications. In Proceeding of SACMAT 2010, pages 163-172. ACM, 2010.
-
(2010)
Proceeding of SACMAT 2010
, pp. 163-172
-
-
Hicks, B.1
Rueda, S.2
King, D.3
Moyer, T.4
Schiffman, J.5
Sreenivasan, Y.6
McDaniel, P.7
Jaeger, T.8
-
31
-
-
78650118369
-
Privacy preserving EHR system using attribute-based infrastructure
-
ACM
-
S. Narayan, M. Gagné, and R. Safavi-Naini. Privacy preserving EHR system using attribute-based infrastructure. In Proceedings of CCSW 2010, pages 47-52. ACM, 2010.
-
(2010)
Proceedings of CCSW 2010
, pp. 47-52
-
-
Narayan, S.1
Gagné, M.2
Safavi-Naini, R.3
-
33
-
-
0345058957
-
Universal designated-verifier signatures
-
R. Steinfeld, L. Bull, H. Wang, and J. Pieprzyk. Universal designated-verifier signatures. Advances in Cryptology-Asiacrypt 2003, pages 523-542, 2003.
-
(2003)
Advances in Cryptology-Asiacrypt 2003
, pp. 523-542
-
-
Steinfeld, R.1
Bull, L.2
Wang, H.3
Pieprzyk, J.4
-
34
-
-
84888352157
-
Making information flow explicit in HiStar
-
USENIX Association
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières. Making information flow explicit in HiStar. In Proceedings of OSDI 2006, pages 263-278. USENIX Association, 2006.
-
(2006)
Proceedings of OSDI 2006
, pp. 263-278
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
|