메뉴 건너뛰기




Volumn 14, Issue 2, 2012, Pages 3-14

A conceptual framework and principles for trusted pervasive health

Author keywords

Conceptual modeling; Digital bubbles; Pervasive health; Privacy; Trustworthiness; Ubiquitous computing

Indexed keywords

ARTICLE; HEALTH STATUS; HUMAN; PRIVACY; THEORETICAL MODEL;

EID: 84862023341     PISSN: None     EISSN: 14388871     Source Type: Journal    
DOI: 10.2196/jmir.1972     Document Type: Article
Times cited : (32)

References (53)
  • 1
    • 78149328298 scopus 로고    scopus 로고
    • Personalized medicine: Part 1: Evolution and development into theranostics
    • Oct;, Medline: 21037908 35
    • Vogenberg FR, Barash CI, Pursel M. Personalized Medicine: Part 1: Evolution and Development into Theranostics. P&T 35 2010 Oct; 35(10):560-576. [Medline: 21037908]
    • (2010) P&T , vol.35 , Issue.10 , pp. 560-576
    • Vogenberg, F.R.1    Barash, C.I.2    Pursel, M.3
  • 2
    • 84862020816 scopus 로고    scopus 로고
    • Personal Health Systems PHS: Overview and research trends URL:, accessed 2012-03-19 WebCite Cache ID 66HaxmDUN
    • Kiefer S. European Commission Information Society. 2007. Personal Health Systems (PHS): Overview and research trends URL: http://ec.europa.eu/ information-society/events/phs-2007/docs/slides/phs2007-kiefer-s1a.pdf [accessed 2012-03-19] [WebCite Cache ID 66HaxmDUN]
    • (2007) European Commission Information Society
    • Kiefer, S.1
  • 3
    • 44249105679 scopus 로고    scopus 로고
    • Pervasive healthcare as a scientific discipline
    • DOI 10.3414/ME9107
    • Bardram JE. Pervasive healthcare as a scientific discipline. Methods Inf Med 2008;47(3):178-185. [doi: 10.3423/ME9197] [Medline: 18473081] (Pubitemid 351723960)
    • (2008) Methods of Information in Medicine , vol.47 , Issue.3 , pp. 178-185
    • Bardram, J.E.1
  • 4
    • 76649128095 scopus 로고    scopus 로고
    • Pervasive healthcare: Paving the way for a pervasive, user-centered and preventive healthcare model
    • doi: 10.3414/ME09-02-0044 Medline: 20011810
    • Arnrich B, Mayora O, Bardram J, Tröster G. Pervasive healthcare: Paving the way for a pervasive, user-centered and preventive healthcare model. Methods Inf Med 2010;49(1):67-73. [doi: 10.3414/ME09-02-0044] [Medline: 20011810]
    • (2010) Methods Inf Med , vol.49 , Issue.1 , pp. 67-73
    • Arnrich, B.1    Mayora, O.2    Bardram, J.3    Tröster, G.4
  • 5
    • 0348011360 scopus 로고    scopus 로고
    • Pervasive healthcare
    • doi: 10.1109/MC.2003.1250897
    • Varchney U. Pervasive healthcare. Computer 2003;36(12):138-140. [doi: 10.1109/MC.2003.1250897]
    • (2003) Computer , vol.36 , Issue.12 , pp. 138-140
    • Varchney, U.1
  • 6
    • 84890300906 scopus 로고    scopus 로고
    • Aug. Reconstructing the whole: Present and future of personal health systems URL:, accessed 2012-03-19 WebCite Cache ID 66HaL4Eds
    • Codagnone C. European Commission Information Society. 2009 Aug. Reconstructing the whole: Present and future of personal health systems URL: http://ec.europa.eu/information-society/activities/health/docs/projects/phs2020/ phs2020-book-rev16082009.pdf [accessed 2012-03-19] [WebCite Cache ID 66HaL4Eds]
    • (2009) European Commission Information Society
    • Codagnone, C.1
  • 7
    • 84862004232 scopus 로고    scopus 로고
    • Newhaven, CT: Yale University; 2003 Dec. 12. Trusted systems: Protecting sensitive information through technological solutions URL:, accessed 2012-01-27 WebCite Cache ID 650H14LTe
    • Wanigasekera C, Feigenbaum J. Sensitive information in a wired world course (CS457). Newhaven, CT: Yale University; 2003 Dec. 12. Trusted systems: Protecting sensitive information through technological solutions URL: http://zoo.cs.yale.edu/classes/cs457/backup/[accessed 2012-01-27] [WebCite Cache ID 650H14LTe]
    • Sensitive Information in A Wired World Course (CS457)
    • Wanigasekera, C.1    Feigenbaum, J.2
  • 8
    • 84861999504 scopus 로고    scopus 로고
    • Jun. A conceptual model and metaphor of everyday privacy in ubiquitous computing environments URL:, accessed 2012-03-19 WebCite Cache ID 66HZyp9vK, Berkeley, CA: Computer Science Division, University of California
    • Lederer S, Deay AK, Mankoff J. UC Berkeley College of Engineering Technical Reports. Berkeley, CA: Computer Science Division, University of California; 2002 Jun. A conceptual model and metaphor of everyday privacy in ubiquitous computing environments URL: http://www.eecs.berkeley.edu/Pubs/ TechRpts/2002/CSD-02-1188.pdf [accessed 2012-03-19] [WebCite Cache ID 66HZyp9vK]
    • (2002) UC Berkeley College of Engineering Technical Reports
    • Lederer, S.1    Deay, A.K.2    Mankoff, J.3
  • 9
    • 0038803983 scopus 로고    scopus 로고
    • Social and political dimensions of privacy
    • DOI 10.1111/1540-4560.00072
    • Westin AF. Social and political dimensions of privacy. Journal of Social Issues 2003 Jul; 59(2):431-453. (Pubitemid 36775199)
    • (2003) Journal of Social Issues , vol.59 , Issue.2 , pp. 431-453
    • Westin, A.F.1
  • 12
    • 84862022496 scopus 로고    scopus 로고
    • URL:, accessed 2012-01-27 WebCite Cache ID 650I5cGMn
    • Wassernaar J. www.w3.org. 2006. Privacy rules, a steeple chase for systems architects URL: http://www.w3.org/2006/07/privacy-ws/papers/04-borking- rules/[accessed 2012-01-27] [WebCite Cache ID 650I5cGMn]
    • (2006) Privacy Rules, A Steeple Chase for Systems Architects
    • Wassernaar, J.1
  • 13
    • 84861999523 scopus 로고
    • Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data URL:, accessed 2012-01-27 WebCite Cache ID 650KVEhUK
    • European Commission. European Commission Justice Data Protection Policies. 1995. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data URL: http://eur-lex.europa.eu/LexUriServ/LexUriServ. do?uri=CELEX:31995L0046:EN:HTML [accessed 2012-01-27] [WebCite Cache ID 650KVEhUK]
    • (1995) European Commission Justice Data Protection Policies
  • 14
    • 0003578535 scopus 로고    scopus 로고
    • Geneva, Switzherland: United Nations;, URL:, accessed 2012-03-19 WebCite Cache ID 66HYMvMaH
    • United Nations. Geneva, Switzherland: United Nations; 2007. Universal Declaration of Human Rights URL: http://www.un.org/events/humanrights/2007/ hrphotos/declaration%20-eng.pdf [accessed 2012-03-19] [WebCite Cache ID 66HYMvMaH]
    • (2007) Universal Declaration of Human Rights
  • 19
    • 84862004230 scopus 로고    scopus 로고
    • Zurich, Switzerland: Swiss Federal Institute of Technology ETH Privacy by design: Principles of privacy-aware ubiquitous systems URL:, accessed 2012-03-27 WebCite Cache ID 66U0efwZR
    • Langheimreich M. Swiss Federal Institute of Technology Zurich. Zurich, Switzerland: Swiss Federal Institute of Technology (ETH) Privacy by design: Principles of privacy-aware ubiquitous systems URL: http://www.vs.inf.ethz.ch/ res/papers/privacy-principles.pdf [accessed 2012-03-27] [WebCite Cache ID 66U0efwZR]
    • Swiss Federal Institute of Technology Zurich
    • Langheimreich, M.1
  • 20
    • 1542267916 scopus 로고    scopus 로고
    • e-Consent: The Design and Implementation of Consumer Consent Mechanisms in an Electronic Environment
    • DOI 10.1197/jamia.M1480
    • Coiera E, Clarke R. e-Consent: The design and implementation of consumer consent mechanisms in an electronic environment. J Am Med Inform Assoc 2004 Apr; 11(2):129-140 [FREE Full text] [doi: 10.1197/jamia. M1480] [Medline: 14662803] (Pubitemid 38327502)
    • (2004) Journal of the American Medical Informatics Association , vol.11 , Issue.2 , pp. 129-140
    • Coiera, E.1    Clarke, R.2
  • 22
    • 84862024828 scopus 로고    scopus 로고
    • Security infrastructure services for patient managed lifelong health record
    • Antalya, Turkey, 2009. Istanbul, Turkey: Victor Babes University Publishing House
    • Ruotsalainen P. Security infrastructure services for patient managed lifelong health record. In: Travel Health Informatics and Telehealth: EFMI Special Topic Conference, Antalya, Turkey, 2009. Istanbul, Turkey: Victor Babes University Publishing House; 2009:51-29.
    • (2009) Travel Health Informatics and Telehealth: EFMI Special Topic Conference , pp. 51-29
    • Ruotsalainen, P.1
  • 23
    • 50249110061 scopus 로고    scopus 로고
    • Privacy infusion in ubiquitous computing, networking and services
    • 2007 MobiQuitous 2007; August 6-10, Philadelphia, PA. doi: 10.1109/MoBIQ.2007.4451030
    • Pallapa G, Kumar M, Das K. Privacy infusion in ubiquitous computing, networking and services. In: Proceedings of MobiQuitous 2007. 2007 Presented at: MobiQuitous 2007; August 6-10, 2007; Philadelphia, PA. [doi: 10.1109/MoBIQ.2007.4451030]
    • (2007) Proceedings of MobiQuitous 2007
    • Pallapa, G.1    Kumar, M.2    Das, K.3
  • 25
    • 84862004234 scopus 로고    scopus 로고
    • August, 2005. Dynamic, context-aware access control for distributed healthcare applications URL:, accessed 2012-03-19 WebCite Cache ID 66HVhI3rd
    • Hu J, Weaver AC. Pervasive Security, Privacy and Trust (PSPT4), August 2005. 2005. Dynamic, context-aware access control for distributed healthcare applications URL: http://www.cs.virginia.edu/~acw/security/doc/Publications/ A%20Dynamic, %20Context-Aware%20Security%20Infrastructure% 20for%20Distri~1.pdf [accessed 2012-03-19] [WebCite Cache ID 66HVhI3rd]
    • (2005) Pervasive Security, Privacy and Trust (PSPT4)
    • Hu, J.1    Weaver, A.C.2
  • 26
    • 51849135530 scopus 로고    scopus 로고
    • Security policies and trust in ubiquitous computing
    • Oct. 28;, FREE Full text doi: 10.1098/rsta.2008.0142 Medline: 18672450
    • Joshi A, Finin T, Kagal L, Parker J, Patwardhan A. Security policies and trust in ubiquitous computing. Philos Transact A Math Phys Eng Sci 2008 Oct. 28;366(1881):3769-3780 [FREE Full text] [doi: 10.1098/rsta.2008.0142] [Medline: 18672450]
    • (2008) Philos Transact A Math Phys Eng Sci , vol.366 , Issue.1881 , pp. 3769-3780
    • Joshi, A.1    Finin, T.2    Kagal, L.3    Parker, J.4    Patwardhan, A.5
  • 27
    • 84862004240 scopus 로고    scopus 로고
    • Towards a security policy for ubiquitous healthcare systems (Position paper)
    • ICUCT 2006, Jeju Island, Korea, December 5-6, revised selected papers. Berlin, Germany: Springer; 2007
    • Stajano F, Kim HJ, Chae J, Kim S. Towards a security policy for ubiquitous healthcare systems (Position paper). In: Ubiquitous Convergence Technology First International Conference, ICUCT 2006, Jeju Island, Korea, December 5-6, 2006: revised selected papers. Berlin, Germany: Springer; 2007.
    • (2006) Ubiquitous Convergence Technology First International Conference
    • Stajano, F.1    Kim, H.J.2    Chae, J.3    Kim, S.4
  • 28
    • 33744500251 scopus 로고    scopus 로고
    • Banking on health: Personal records and information exchange
    • Medline: 16669591
    • Ball MJ, Gold J. Banking on health: Personal records and information exchange. J Healthcare Inf Management 2006;20(2):71-83. [Medline: 16669591]
    • (2006) J Healthcare Inf Management , vol.20 , Issue.2 , pp. 71-83
    • Ball, M.J.1    Gold, J.2
  • 29
    • 84862024386 scopus 로고    scopus 로고
    • Harvard law and policy review
    • accessed 2012-03-19 WebCite Cache ID 66HVTSzjj
    • Kendall DB. Harvard Law and Policy Review. Protecting patient privacy in the information age URL: http://www.hlpronline.com/kendall.pdf [accessed 2012-03-19] [WebCite Cache ID 66HVTSzjj]
    • Protecting Patient Privacy in the Information Age URL
    • Kendall, D.B.1
  • 30
    • 78751705912 scopus 로고    scopus 로고
    • Aspects of privacy for electronic health records
    • Feb;, doi: 10.1016/j.ijmedinf.2010.10.001 Medline: 21041113
    • Haas S, Wohlgemuth S, Echizen I, Sonehara N, Müller G. Aspects of privacy for electronic health records. Int J Med Inform 2011 Feb; 80(2):e26-e31. [doi: 10.1016/j.ijmedinf.2010.10.001] [Medline: 21041113]
    • (2011) Int J Med Inform , vol.80 , Issue.2
    • Haas, S.1    Wohlgemuth, S.2    Echizen, I.3    Sonehara, N.4    Müller, G.5
  • 31
    • 52149091905 scopus 로고    scopus 로고
    • The ethical challenges of ubiquitous healthcare
    • FREE Full text WebCite Cache
    • Brown I, Adams AA. The ethical challenges of ubiquitous healthcare. International Review of Information Ethics 2007;8:53-60 [FREE Full text] [WebCite Cache]
    • (2007) International Review of Information Ethics , vol.8 , pp. 53-60
    • Brown, I.1    Adams, A.A.2
  • 33
    • 23244445557 scopus 로고    scopus 로고
    • X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control
    • DOI 10.1145/1065545.1065547
    • Bhatti R. X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control. ACM Transactions on Information and System Security 2005;8(2):187-227. [doi: 10.1145/1065545.1065547] (Pubitemid 41092671)
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.2 , pp. 187-227
    • Bhatti, R.1    Ghafoor, A.2    Bertino, E.3    Joshi, J.B.D.4
  • 35
    • 35748966386 scopus 로고    scopus 로고
    • Indivo: A personally controlled health record for health information exchange and communication
    • DOI 10.1186/1472-6947-7-25
    • Mandl KD, Simons WW, Crawford WC, Abbett JM. Indivo: a personally controlled health record for health information exchange and communication. BMC Med Inform Decision Making 2007;7(25) [FREE Full text] [doi: 10.1186/1472-6947-7-25] [Medline: 17850667] (Pubitemid 350046021)
    • (2007) BMC Medical Informatics and Decision Making , vol.7 , pp. 25
    • Mandl, K.D.1    Simons, W.W.2    Crawford, W.C.R.3    Abbett, J.M.4
  • 36
    • 68349133104 scopus 로고    scopus 로고
    • A privacy management architecture for patient-controlled personal health record systems URL:, accessed 2012-03-19 WebCite Cache ID 66HUH8rwr
    • Huda MN, Sonehara N, Yamada S. Journal of Engineering Science and Technology (JESTEC). 2009. A privacy management architecture for patient-controlled personal health record systems URL: http://jestec.taylors. edu.my/Vol%25204%2520Issue%25202%2520June%252009/Vol-4-2-154-170-MD-NURUL-HUDA. pdf [accessed 2012-03-19] [WebCite Cache ID 66HUH8rwr]
    • (2009) Journal of Engineering Science and Technology (JESTEC)
    • Huda, M.N.1    Sonehara, N.2    Yamada, S.3
  • 37
    • 33646043128 scopus 로고    scopus 로고
    • A global socio-economic-medico-legal model for the sustainability of longitudinal electronic health records: Part 1
    • Shabo A. A global socio-economic-medico-legal model for the sustainability of longitudinal electronic health records. Part 1. Methods Inf Med 2006;45(3):240-245. [Medline: 16685331] (Pubitemid 44047725)
    • (2006) Methods of Information in Medicine , vol.45 , Issue.3 , pp. 240-245
    • Shabo, A.1
  • 38
    • 78751702210 scopus 로고    scopus 로고
    • Ehealth in Belgium, a new "secure" federal network: Role of patients, health professions and social security services
    • Feb;, doi: 10.1016/j.ijmedinf.2010.10.005 Medline: 21035383
    • France F. eHealth in Belgium, a new "secure" federal network: role of patients, health professions and social security services. Int J Med Inform 2011 Feb; 80(2):e12-e16. [doi: 10.1016/j.ijmedinf.2010.10.005] [Medline: 21035383]
    • (2011) Int J Med Inform , vol.80 , Issue.2
    • France, F.1
  • 40
    • 84861999530 scopus 로고    scopus 로고
    • The value of personal health records: A joint position statement for consumers of health care
    • American Health Information Management Association and American Medical Informatics Association, In: Bos L, Blobel B, Marsh A, Carroll D, editors, Amsterdam, Netherlands: IOS Press
    • American Health Information Management Association and American Medical Informatics Association. The value of personal health records: A joint position statement for consumers of health care. In: Bos L, Blobel B, Marsh A, Carroll D, editors. Medical and Care Compunetics 5 (Technology and Informatics). Amsterdam, Netherlands: IOS Press; 2008.
    • (2008) Medical and Care Compunetics 5 (Technology and Informatics)
  • 41
    • 85050450807 scopus 로고    scopus 로고
    • Virtual walls: Protecting privacy in pervasive environments
    • PERVASIVE 2007. Berlin: Springler Verlag;, The 5th International Conference on Pervasive Computing; May 13-16, 2007; Toronto, Ontario. doi: 10.1007/978-3-540-72037-9-10
    • Kapadia A, Henderson T, Fielding JJ, Kotz D. Virtual walls: Protecting privacy in pervasive environments. In: Proceedings Pervasive Computing, 5th International Conference, PERVASIVE 2007. Berlin: Springler Verlag; 2007 Presented at: The 5th International Conference on Pervasive Computing; May 13-16, 2007; Toronto, Ontario. [doi: 10.1007/978-3-540-72037-9-10]
    • (2007) Proceedings Pervasive Computing, 5th International Conference
    • Kapadia, A.1    Henderson, T.2    Fielding, J.J.3    Kotz, D.4
  • 43
    • 0003789235 scopus 로고    scopus 로고
    • A health information network for Australia
    • National Electronic Health Records Taskforce, Commonwealth of Australia, In:, Australia: Minister of Health
    • National Electronic Health Records Taskforce, Commonwealth of Australia. A health information network for Australia. In: Report to Health Ministers by the National Electronic Health Records Taskforce. Australia: Minister of Health; 2000.
    • (2000) Report to Health Ministers by the National Electronic Health Records Taskforce
  • 44
    • 84862003000 scopus 로고    scopus 로고
    • Personal health records and personal health record systems: A report and recommendations from the National Committee on Vital and Health Statistics URL:, accessed 2012-03-19 WebCite Cache ID 66HRqyKAr
    • US Department of Health and Human Services. National Committee on Vital and Health Statistics. 2006. Personal health records and personal health record systems: A report and recommendations from the National Committee on Vital and Health Statistics URL: http://ncvhs.hhs.gov/0602nhiirpt.pdf [accessed 2012-03-19] [WebCite Cache ID 66HRqyKAr]
    • (2006) National Committee on Vital and Health Statistics
  • 45
    • 33644682163 scopus 로고    scopus 로고
    • Personal health records: Definitions, benefits, and strategies for overcoming barriers to adoption
    • DOI 10.1197/jamia.M2025, PII S1067502705002471
    • Tang PC, Ash JS, Bates DW, Overhage JM, Sands DZ. Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption. J Am Med Inform Assoc 2006;13(2):121-126 [FREE Full text] [doi: 10.1197/jamia. M2025] [Medline: 16357345] (Pubitemid 43332901)
    • (2006) Journal of the American Medical Informatics Association , vol.13 , Issue.2 , pp. 121-126
    • Tang, P.C.1    Ash, J.S.2    Bates, D.W.3    Overhage, J.M.4    Sands, D.Z.5
  • 46
    • 57349188957 scopus 로고    scopus 로고
    • Integrated personal health records: Transformative tools for consumer-centric care
    • FREE Full text doi: 10.1186/1472-6947-8-45 Medline: 18837999
    • Detmer D, Bloomrosen M, Raymond B, Tang P. Integrated personal health records: transformative tools for consumer-centric care. BMC Med Inform Decis Mak 2008;8:45 [FREE Full text] [doi: 10.1186/1472-6947-8-45] [Medline: 18837999]
    • (2008) BMC Med Inform Decis Mak , vol.8 , pp. 45
    • Detmer, D.1    Bloomrosen, M.2    Raymond, B.3    Tang, P.4
  • 48
  • 49
    • 63449120632 scopus 로고    scopus 로고
    • A formal security policy for an NHS electronic health record service
    • March 2005. London, UK: University of Cambridge; Mar. 01
    • Becker MY. A formal security policy for an NHS electronic health record service. In: University of Cambridge, Technical Report number 628, March 2005. London, UK: University of Cambridge; Mar. 01, 2005.
    • (2005) University of Cambridge, Technical Report Number 628
    • Becker, M.Y.1
  • 50
    • 83055191318 scopus 로고    scopus 로고
    • Framework model and principles for trusted information sharing in pervasive health
    • Medline: 21893799
    • Ruotsalainen P, Blobel B, Nykänen P, Seppälä A, Sorvari H. Framework model and principles for trusted information sharing in pervasive health. Stud Health Technol Inform 2011;169:497-501. [Medline: 21893799]
    • (2011) Stud Health Technol Inform , vol.169 , pp. 497-501
    • Ruotsalainen, P.1    Blobel, B.2    Nykänen, P.3    Seppälä, A.4    Sorvari, H.5
  • 51
    • 33745264384 scopus 로고    scopus 로고
    • Modelling privilege management and access control
    • DOI 10.1016/j.ijmedinf.2005.08.010, PII S1386505605001747
    • Blobel B, Nordberg R, Davis JM, Pharow P. Modelling privilege management and access control. Int J Med Inform 2006 Aug; 75(8):597-623. [doi: 10.1016/j.ijmedinf.2005.08.010] [Medline: 16199198] (Pubitemid 43928839)
    • (2006) International Journal of Medical Informatics , vol.75 , Issue.8 , pp. 597-623
    • Blobel, B.1    Nordberg, R.2    Davis, J.M.3    Pharow, P.4
  • 52
    • 84862022633 scopus 로고    scopus 로고
    • Apr. 11, Communication from the Commission to the European parliament, the council, the economic and social committee and the committee of the regions: A comprehensive approach on personal data protection in the European Union URL:, accessed 2012-03-27 WebCite Cache ID 66U8qB7LI
    • European Commission. Brussels, Belgium: European Commission; 2010 Apr. 11. Communication from the Commission to the European parliament, the council, the economic and social committee and the committee of the regions: A comprehensive approach on personal data protection in the European Union URL: http://ec.europa.eu/justice/news/consulting-public/0006/com-2010-609-en.pdf [accessed 2012-03-27] [WebCite Cache ID 66U8qB7LI]
    • (2010) Brussels, Belgium: European Commission
  • 53
    • 84862024391 scopus 로고    scopus 로고
    • Pervasive health care services and technologies
    • FREE Full text doi: 10.1155/2008/946082 Medline: 18825271
    • Hussain S, Yang LT, Laforest F, Verdier C. Pervasive health care services and technologies. Int J Telemed Appl 2008;946082 [FREE Full text] [doi: 10.1155/2008/946082] [Medline: 18825271]
    • (2008) Int J Telemed Appl , pp. 946082
    • Hussain, S.1    Yang, L.T.2    Laforest, F.3    Verdier, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.