메뉴 건너뛰기




Volumn 51, Issue 3, 2012, Pages 221-228

Wireless LAN security management with location detection capability in hospitals

Author keywords

Location detection; Security management; Wireless LAN

Indexed keywords

ARTICLE; COMPUTER SECURITY; CONFIDENTIALITY; ELECTROMAGNETIC RADIATION; HUMAN; INSTRUMENTATION; LOCAL AREA NETWORK; UNITED STATES; WIRELESS COMMUNICATION;

EID: 84861315379     PISSN: 00261270     EISSN: None     Source Type: Journal    
DOI: 10.3414/ME10-01-0002     Document Type: Article
Times cited : (6)

References (17)
  • 1
    • 33846234260 scopus 로고    scopus 로고
    • Development of a personal digital assistant-based wireless application in clinical practice
    • Chen Y, Chiu H, Tsai M, Chang H, Chong C. Development of a personal digital assistant-based wireless application in clinical practice. Computer Methods Programs Biomed 2007; 85 (2): 181-184.
    • (2007) Computer Methods Programs Biomed , vol.85 , Issue.2 , pp. 181-184
    • Chen, Y.1    Chiu, H.2    Tsai, M.3    Chang, H.4    Chong, C.5
  • 2
  • 3
    • 44249097554 scopus 로고    scopus 로고
    • An open and reconfigurable wireless sensor network for pervasive health monitoring
    • Triantafyllidis A, Koutkias V, Chouvarda I, Magla-veras N. An open and reconfigurable wireless sensor network for pervasive health monitoring. Methods Inf Med 2008; 47 (3): 229-334.
    • (2008) Methods Inf Med , vol.47 , Issue.3 , pp. 229-334
    • Triantafyllidis, A.1    Koutkias, V.2    Chouvarda, I.3    Magla-Veras, N.4
  • 5
    • 84861311257 scopus 로고    scopus 로고
    • Ministry of Health, Labor and Welfare (Japan), Unofficial English translation is available at http://rylab.hcc.h.u-tokyo.ac.jp/guidelines.html
    • Ministry of Health, Labor and Welfare (Japan). Guidelines for the Security Management of Health Information Systems. Available at http://www.mhlw.go.jp/shingi/2010/02/s0202-4.html. Unofficial English translation is available at http://rylab. hcc.h.u-tokyo.ac.jp/guidelines.html.
    • Guidelines For the Security Management of Health Information Systems
  • 7
    • 33751253442 scopus 로고    scopus 로고
    • Access control protocols with two-layer architecture for wireless networks
    • Wan Z, Deng HR, Bao F, Ananda LA. Access control protocols with two-layer architecture for wireless networks. Computer Networks 2007; 51 (3): 655-670.
    • (2007) Computer Networks , vol.51 , Issue.3 , pp. 655-670
    • Wan, Z.1    Deng, H.R.2    Bao, F.3    Ananda, L.A.4
  • 8
    • 10644297048 scopus 로고    scopus 로고
    • From secure wired networks to secure wireless networks? what are the extra risks?
    • Solms B, Marais E. From secure wired networks to secure wireless networks? what are the extra risks? Computers & Security 2004; 23 (8): 633-637.
    • (2004) Computers & Security , vol.23 , Issue.8 , pp. 633-637
    • Solms, B.1    Marais, E.2
  • 9
    • 33645140577 scopus 로고    scopus 로고
    • Usability pitfalls in wireless LAN security
    • Furnell S, Ghita B. Usability pitfalls in wireless LAN security. Network Security 2006; 2006 (3): 4-8.
    • (2006) Network Security , vol.2006 , Issue.3 , pp. 4-8
    • Furnell, S.1    Ghita, B.2
  • 10
    • 25844445352 scopus 로고    scopus 로고
    • Modelling corporate wireless security and privacy
    • Katos V, Adams C. Modelling corporate wireless security and privacy. J Strategic Inform Systems 2005; 14 (3): 307-321.
    • (2005) J Strategic Inform Systems , vol.14 , Issue.3 , pp. 307-321
    • Katos, V.1    Adams, C.2
  • 11
    • 33751220510 scopus 로고    scopus 로고
    • Flexible and fast security solution for wireless LAN
    • Badra M, Urien P, Hajjeh I. Flexible and fast security solution for wireless LAN. Pervasive Mob Com-put 2007; 3 (1): 1-14.
    • (2007) Pervasive Mob Com-put , vol.3 , Issue.1 , pp. 1-14
    • Badra, M.1    Urien, P.2    Hajjeh, I.3
  • 12
    • 34548130719 scopus 로고    scopus 로고
    • Remote analysis of a distributed WLAN using passive wireless-side measurement
    • Mahanti A, Williamson C, Arlitt M. Remote analysis of a distributed WLAN using passive wireless-side measurement. Performance Evaluation 2007; 64 (9-12): 909-932.
    • (2007) Performance Evaluation , vol.64 , Issue.9-12 , pp. 909-932
    • Mahanti, A.1    Williamson, C.2    Arlitt, M.3
  • 13
    • 33746150390 scopus 로고    scopus 로고
    • Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
    • Sobh ST. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art. Computer Standards & Interfaces 2006; 28(6): 670-694.
    • (2006) Computer Standards & Interfaces , vol.28 , Issue.6 , pp. 670-694
    • Sobh, S.T.1
  • 14
    • 0348170825 scopus 로고    scopus 로고
    • Rogue access points? threat to enterprise security
    • Potter B. Rogue access points? threat to enterprise security. Network Security 2003; 2003 (4): 4-5.
    • (2003) Network Security , vol.2003 , Issue.4 , pp. 4-5
    • Potter, B.1
  • 15
    • 36549043496 scopus 로고    scopus 로고
    • Enhancing the accuracy of WLAN-based location determination systems using predicted orientation information
    • Liao I, Kao K. Enhancing the accuracy of WLAN-based location determination systems using predicted orientation information. Inf Sci 2008; 178 (4): 1049-1068.
    • (2008) Inf Sci , vol.178 , Issue.4 , pp. 1049-1068
    • Liao, I.1    Kao, K.2
  • 16
    • 63049132386 scopus 로고    scopus 로고
    • Detecting rogue access points using client-side bottleneck bandwidth analysis
    • Kao K, Liao I, Li Y. Detecting rogue access points using client-side bottleneck bandwidth analysis. Computers & Security 2009; 28 (3-4): 144-152.
    • (2009) Computers & Security , vol.28 , Issue.3-4 , pp. 144-152
    • Kao, K.1    Liao, I.2    Li, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.