메뉴 건너뛰기




Volumn 36, Issue 3, 2012, Pages 1009-1020

Mobile agent application and integration in electronic anamnesis system

Author keywords

Access control; Electronic anamnesis; Electronic patient record; Mobile agent; One way hash function

Indexed keywords

ANAMNESIS; ARTICLE; ELECTRONIC MEDICAL RECORD; HEALTH SERVICE; HEALTH STATUS; HOSPITAL MANAGEMENT; MEDICAL SERVICE; MEDICAL TECHNOLOGY; PRODUCTIVITY; QUALITY OF LIFE; RELIABILITY; SYSTEM ANALYSIS; TOTAL QUALITY MANAGEMENT;

EID: 84864031689     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-010-9563-3     Document Type: Article
Times cited : (9)

References (21)
  • 4
    • 84864072249 scopus 로고    scopus 로고
    • Division of Security and Protection of Information Systems in Health Care
    • NVN-ENV 12924, Medical informatics, Division of Security and Protection of Information Systems in Health Care, 1997.
    • (1997) NVN-ENV 12924, Medical Informatics
  • 5
    • 79961170190 scopus 로고    scopus 로고
    • A mechanism to verify the integrity of computer-based patient records
    • December
    • Wang, D.W., Liu, D. R., and Chen, Y. C., A mechanism to verify the integrity of computer-based patient records. J. China Assoc. Med. Inform., (10), 71-84, 1999. December.
    • (1999) J. China Assoc. Med. Inform. , Issue.10 , pp. 71-84
    • Wang, D.W.1    Liu, D.R.2    Chen, Y.C.3
  • 9
    • 68849100401 scopus 로고    scopus 로고
    • Efficient migration access control for mobile agents
    • Chung, Y. F., Chen, T. S., and Lai, M. W., Efficient migration access control for mobile agents. Comput. Stand. Interfaces 31 (6):1061-1068, 2009.
    • (2009) Comput. Stand. Interfaces , vol.31 , Issue.6 , pp. 1061-1068
    • Chung, Y.F.1    Chen, T.S.2    Lai, M.W.3
  • 10
    • 58549084844 scopus 로고    scopus 로고
    • Key hierarchies for hierarchical access control in secure group communications
    • Yan, J. Z., Ma, J. F., and Liu, H. Y., Key hierarchies for hierarchical access control in secure group communications. Comput. Networkings: Int. J. Comput. Telecom. Networking 53 (3):353-364, 2009.
    • (2009) Comput. Networkings: Int. J. Comput. Telecom. Networking , vol.53 , Issue.3 , pp. 353-364
    • Yan, J.Z.1    Ma, J.F.2    Liu, H.Y.3
  • 13
    • 72849140683 scopus 로고    scopus 로고
    • Efficient key management scheme for hierarchical access control in mobile agents
    • Chen, H. B., Liao, C. W., and Yeh, C. K., Efficient key management scheme for hierarchical access control in mobile agents. WSEAS Trans. Commun. 8(10):1106-1116, 2009.
    • (2009) WSEAS Trans. Commun. , vol.8 , Issue.10 , pp. 1106-1116
    • Chen, H.B.1    Liao, C.W.2    Yeh, C.K.3
  • 15
    • 34248671101 scopus 로고    scopus 로고
    • Key management for content access control in a hierarchy
    • DOI 10.1016/j.comnet.2006.12.011, PII S1389128607000333
    • Hassen, H. R., Bouabdallah, A., Bettahar, H., and Challal, Y., Key management for content access control in a hierarchy. Comput. Networkings: Int. J. Comput. Telecom. Networking 51(11):3197-3219, 2007. (Pubitemid 46777449)
    • (2007) Computer Networks , vol.51 , Issue.11 , pp. 3197-3219
    • Hassen, H.R.1    Bouabdallah, A.2    Bettahar, H.3    Challal, Y.4
  • 16
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl, S. G., Taylor, P., Akl, S. G., and Taylor, P. D., Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. l(3):239-248, 1983.
    • (1983) ACM Trans. Comput. Syst. , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.2    Akl, S.G.3    Taylor, P.D.4
  • 17
    • 71749111864 scopus 로고    scopus 로고
    • Variations on a theme by Akl and Taylor: Security and tradeoffs
    • Arco, P. D., Santis, A. D., Ferrara, A. L., and Masucci, B., Variations on a theme by Akl and Taylor: security and tradeoffs. Theor. Comput. Sci. 411(1):213-227, 2010.
    • (2010) Theor. Comput. Sci. , vol.411 , Issue.1 , pp. 213-227
    • Arco, P.D.1    Santis, A.D.2    Ferrara, A.L.3    Masucci, B.4
  • 18
    • 0032121340 scopus 로고    scopus 로고
    • Access control and key management for mobile agents
    • Volker, R., and Mehrdad, J. S., Access control and key management for mobile agents. Comput. Graph. 22(4):457-461, 1998.
    • (1998) Comput. Graph. , vol.22 , Issue.4 , pp. 457-461
    • Volker, R.1    Mehrdad, J.S.2
  • 19
    • 2342477274 scopus 로고    scopus 로고
    • Efficient access control and key management schemes for mobile agents
    • Lin, L. C., Ou, H. H., and Hwang, M. S., Efficient access control and key management schemes for mobile agents. Comput. Stand. Interfaces 26(5):423-433, 2004.
    • (2004) Comput. Stand. Interfaces , vol.26 , Issue.5 , pp. 423-433
    • Lin, L.C.1    Ou, H.H.2    Hwang, M.S.3
  • 21
    • 38249003211 scopus 로고
    • Access control in a hierarchy using a one-way trapdoor function
    • Chang, C. C., and Buehrer, D. J., Access control in a hierarchy using a one-way trapdoor function. Comput. Math. Appl. 26(5):71-76, 1993.
    • (1993) Comput. Math. Appl. , vol.26 , Issue.5 , pp. 71-76
    • Chang, C.C.1    Buehrer, D.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.