-
1
-
-
84857092291
-
An interoperable cross-context architecture to manage distributed personal e-health information
-
IGI Global, Inc.
-
M. Deng, D. D. Cock, and B. Preneel, "An interoperable cross-context architecture to manage distributed personal e-health information," in Handbook of Research on Developments in e-Health and Telemedicine: Technological and Social Perspectives. IGI Global, Inc., 2009, pp. 576-602.
-
(2009)
Handbook of Research on Developments in E-Health and Telemedicine: Technological and Social Perspectives
, pp. 576-602
-
-
Deng, M.1
Cock, D.D.2
Preneel, B.3
-
2
-
-
4544250025
-
Security specification and implementation for mobile e-health services
-
IEEE Computer Society
-
R. Martí, J. Delgado, and X. Perramon, "Security specification and implementation for mobile e-health services," in Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04). IEEE Computer Society, 2004, pp. 241-248.
-
(2004)
Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04)
, pp. 241-248
-
-
Martí, R.1
Delgado, J.2
Perramon, X.3
-
3
-
-
50249098718
-
Privacy in mobile web services ehealth
-
K. Elmufti, D. Weerasinghe, M. Rajarajan, V. Rakocevic, and S. Khan, "Privacy in mobile web services ehealth," Pervasive Health Conference and Workshops, pp. 1-6, 2006.
-
(2006)
Pervasive Health Conference and Workshops
, pp. 1-6
-
-
Elmufti, K.1
Weerasinghe, D.2
Rajarajan, M.3
Rakocevic, V.4
Khan, S.5
-
4
-
-
79955892288
-
Key factors for personal health monitoring and diagnosis devices
-
Schwaibold, M. Gmelin, G. von Wagner, J. Schchlin, and A. Bolz, "Key factors for personal health monitoring and diagnosis devices," in Mobile Computing in Medicine, 2002, pp. 143-150.
-
(2002)
Mobile Computing in Medicine
, pp. 143-150
-
-
Schwaibold1
Gmelin, M.2
Von Wagner, G.3
Schchlin, J.4
Bolz, A.5
-
5
-
-
52149091653
-
Multi-domain and privacy-aware role based access control in ehealth
-
L. Martino, Q. Ni, D. Lin, and E. Bertino, "Multi-domain and privacy-aware role based access control in ehealth," in Pervasive Computing Technologies for Healthcare, 2008. PervasiveHealth 2008. Second International Conference on, February 2008, pp. 131-134.
-
Pervasive Computing Technologies for Healthcare, 2008. PervasiveHealth 2008. Second International Conference On, February 2008
, pp. 131-134
-
-
Martino, L.1
Ni, Q.2
Lin, D.3
Bertino, E.4
-
7
-
-
84861605473
-
Securing the access to electronic health records on mobile phones
-
Springer-Verlag, Ed.
-
A. Dmitrienko, Z. Hadzic, H. Lhr, A.-R. Sadeghi, and M. Winandy, "Securing the access to electronic health records on mobile phones," in Biomedical Engineering Systems and Technologies, Springer-Verlag, Ed., 2011.
-
(2011)
Biomedical Engineering Systems and Technologies
-
-
Dmitrienko, A.1
Hadzic, Z.2
Lhr, H.3
Sadeghi, A.-R.4
Winandy, M.5
-
8
-
-
84861626533
-
New secure communication protocols for mobile e-health system
-
October published By Foundation of Computer Science
-
M.Aramudhan and K.Mohan, "New secure communication protocols for mobile e-health system," International Journal of Computer Applications, vol. 8, no. 4, pp. 10-15, October 2010, published By Foundation of Computer Science.
-
(2010)
International Journal of Computer Applications
, vol.8
, Issue.4
, pp. 10-15
-
-
Aramudhan, M.1
Mohan, K.2
-
9
-
-
33644593561
-
Pki-based secure mobile access to electronic health services and data
-
December
-
G. Kambourakis, I. Maglogiannis, and A. Rouskas, "Pki-based secure mobile access to electronic health services and data," Technol. Health Care, vol. 13, pp. 511-526, December 2005.
-
(2005)
Technol. Health Care
, vol.13
, pp. 511-526
-
-
Kambourakis, G.1
Maglogiannis, I.2
Rouskas, A.3
-
11
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Denning and P. J. Denning, "Certification of programs for secure information flow," Communications of the ACM, vol. 20, no. 7, pp. 504-513, 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
13
-
-
41149174293
-
Mobile e-Health monitoring: An agent-based approach
-
Feb.
-
V. Chan, P. Ray, and N. Parameswaran, "Mobile e-Health monitoring: an agent-based approach," Communications, IET, vol. 2, no. 2, pp. 223-230, Feb. 2008.
-
(2008)
Communications, IET
, vol.2
, Issue.2
, pp. 223-230
-
-
Chan, V.1
Ray, P.2
Parameswaran, N.3
-
14
-
-
84855746345
-
-
[Online]. Available
-
McAfee, Inc., "Mcafee threats report: Third quarter 2011," 2011. [Online]. Available: http://www.mcafee.com/us/resources/reports/rp- quarterly-threat-q3-2011.pdf
-
(2011)
Mcafee Threats Report: Third Quarter 2011
-
-
-
15
-
-
77950656036
-
Enhancing e-health information systems with agent technology
-
January
-
M. T. Nguyen, P. Fuhrer, and J. Pasquier-Rocha, "Enhancing e-health information systems with agent technology," Int. J. Telemedicine Appl., vol. 2009, pp. 1:1-1:13, January 2009.
-
(2009)
Int. J. Telemedicine Appl.
, vol.2009
-
-
Nguyen, M.T.1
Fuhrer, P.2
Pasquier-Rocha, J.3
-
16
-
-
51449094371
-
Semantics and analysis of business process models in BPMN
-
R. M. Dijkman, M. Dumas, and C. Ouyang, "Semantics and analysis of business process models in BPMN," Information & Software Technology, vol. 50, no. 12, pp. 1281-1294, 2008.
-
(2008)
Information & Software Technology
, vol.50
, Issue.12
, pp. 1281-1294
-
-
Dijkman, R.M.1
Dumas, M.2
Ouyang, C.3
-
17
-
-
0015672289
-
A note on the confinement problem
-
October
-
B. Lampson, "A note on the confinement problem," Communications of the ACM, vol. 16, no. 10, pp. 613-615, October 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
18
-
-
70349373797
-
Petri net transformations for business processes - A survey
-
N. Lohmann, H. Verbeek, and R. M. Dijkman, "Petri net transformations for business processes - a survey," LNCS ToPNoC, vol. II, no. 5460, pp. 46-63, 2009.
-
(2009)
LNCS ToPNoC
, vol.2
, Issue.5460
, pp. 46-63
-
-
Lohmann, N.1
Verbeek, H.2
Dijkman, R.M.3
-
19
-
-
74049123448
-
Structural non-interference in elementary and trace nets
-
N. Busi and R. Gorrieri, "Structural non-interference in elementary and trace nets," Mathematical Structures in Computer Science, vol. 19, no. 6, pp. 1065-1090, 2009.
-
(2009)
Mathematical Structures in Computer Science
, vol.19
, Issue.6
, pp. 1065-1090
-
-
Busi, N.1
Gorrieri, R.2
-
22
-
-
38149062061
-
Generating Petri net state spaces
-
ICATPN 2007, ser. Springer
-
K. Wolf, "Generating Petri net state spaces," in ICATPN 2007, ser. LNCS 4546. Springer, 2007, pp. 29-42.
-
(2007)
LNCS
, vol.4546
, pp. 29-42
-
-
Wolf, K.1
-
23
-
-
84872934204
-
Model support for confidential service-oriented business processes
-
A. Lehmann and N. Lohmann, "Model support for confidential service-oriented business processes," in Proceedings of the 4th Central-European Workshop on Services and their Composition, ZEUS 2012, Bamberg, Germany, February 23-24, 2012, 2012.
-
(2012)
Proceedings of the 4th Central-European Workshop on Services and Their Composition, ZEUS 2012, Bamberg, Germany, February 23-24, 2012
-
-
Lehmann, A.1
Lohmann, N.2
|