-
4
-
-
84864072249
-
-
Division of Security and Protection of Information Systems in Health Care
-
NVN-ENV 12924, Medical informatics, Division of Security and Protection of Information Systems in Health Care, 1997.
-
(1997)
NVN-ENV 12924, Medical Informatics
-
-
-
5
-
-
79961170190
-
A mechanism to verify the integrity of computer-based patient records
-
December
-
Wang, D.W., Liu, D. R., and Chen, Y. C., A mechanism to verify the integrity of computer-based patient records. J. China Assoc. Med. Inform., (10), 71-84, 1999. December.
-
(1999)
J. China Assoc. Med. Inform.
, Issue.10
, pp. 71-84
-
-
Wang, D.W.1
Liu, D.R.2
Chen, Y.C.3
-
7
-
-
74049110390
-
Patient controlled encryption: Ensuring privacy of electronic medical records
-
November
-
Benaloh, J., Chase, M., Horvitz, E., and Lauter, K., Patient controlled encryption: Ensuring privacy of electronic medical records. Proceedings of the 2009 ACM workshop on Cloud computing security, November, 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
9
-
-
68849100401
-
Efficient migration access control for mobile agents
-
Chung, Y. F., Chen, T. S., and Lai, M. W., Efficient migration access control for mobile agents. Comput. Stand. Interfaces 31 (6):1061-1068, 2009.
-
(2009)
Comput. Stand. Interfaces
, vol.31
, Issue.6
, pp. 1061-1068
-
-
Chung, Y.F.1
Chen, T.S.2
Lai, M.W.3
-
10
-
-
58549084844
-
Key hierarchies for hierarchical access control in secure group communications
-
Yan, J. Z., Ma, J. F., and Liu, H. Y., Key hierarchies for hierarchical access control in secure group communications. Comput. Networkings: Int. J. Comput. Telecom. Networking 53 (3):353-364, 2009.
-
(2009)
Comput. Networkings: Int. J. Comput. Telecom. Networking
, vol.53
, Issue.3
, pp. 353-364
-
-
Yan, J.Z.1
Ma, J.F.2
Liu, H.Y.3
-
12
-
-
84887684068
-
Privilege management and access control in shared care IS and EHR
-
IOS Press, Amsterdam
-
Blobel, B., and Nordberg, R., Privilege management and access control in shared care IS and EHR. in Proceedings of the MIE 2003, Studies in Health Technology and Informatics, Vol. 95, IOS Press, Amsterdam, 2003.
-
(2003)
Proceedings of the MIE 2003, Studies in Health Technology and Informatics
, vol.95
-
-
Blobel, B.1
Nordberg, R.2
-
13
-
-
72849140683
-
Efficient key management scheme for hierarchical access control in mobile agents
-
Chen, H. B., Liao, C. W., and Yeh, C. K., Efficient key management scheme for hierarchical access control in mobile agents. WSEAS Trans. Commun. 8(10):1106-1116, 2009.
-
(2009)
WSEAS Trans. Commun.
, vol.8
, Issue.10
, pp. 1106-1116
-
-
Chen, H.B.1
Liao, C.W.2
Yeh, C.K.3
-
14
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
Atallah, M. J., Blanton, M., Fazio, N., and Frikken, K. B., Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur. (TISSEC) 12(3):1-43, 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur. (TISSEC)
, vol.12
, Issue.3
, pp. 1-43
-
-
Atallah, M.J.1
Blanton, M.2
Fazio, N.3
Frikken, K.B.4
-
15
-
-
34248671101
-
Key management for content access control in a hierarchy
-
DOI 10.1016/j.comnet.2006.12.011, PII S1389128607000333
-
Hassen, H. R., Bouabdallah, A., Bettahar, H., and Challal, Y., Key management for content access control in a hierarchy. Comput. Networkings: Int. J. Comput. Telecom. Networking 51(11):3197-3219, 2007. (Pubitemid 46777449)
-
(2007)
Computer Networks
, vol.51
, Issue.11
, pp. 3197-3219
-
-
Hassen, H.R.1
Bouabdallah, A.2
Bettahar, H.3
Challal, Y.4
-
16
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl, S. G., Taylor, P., Akl, S. G., and Taylor, P. D., Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. l(3):239-248, 1983.
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.2
Akl, S.G.3
Taylor, P.D.4
-
17
-
-
71749111864
-
Variations on a theme by Akl and Taylor: Security and tradeoffs
-
Arco, P. D., Santis, A. D., Ferrara, A. L., and Masucci, B., Variations on a theme by Akl and Taylor: security and tradeoffs. Theor. Comput. Sci. 411(1):213-227, 2010.
-
(2010)
Theor. Comput. Sci.
, vol.411
, Issue.1
, pp. 213-227
-
-
Arco, P.D.1
Santis, A.D.2
Ferrara, A.L.3
Masucci, B.4
-
18
-
-
0032121340
-
Access control and key management for mobile agents
-
Volker, R., and Mehrdad, J. S., Access control and key management for mobile agents. Comput. Graph. 22(4):457-461, 1998.
-
(1998)
Comput. Graph.
, vol.22
, Issue.4
, pp. 457-461
-
-
Volker, R.1
Mehrdad, J.S.2
-
19
-
-
2342477274
-
Efficient access control and key management schemes for mobile agents
-
Lin, L. C., Ou, H. H., and Hwang, M. S., Efficient access control and key management schemes for mobile agents. Comput. Stand. Interfaces 26(5):423-433, 2004.
-
(2004)
Comput. Stand. Interfaces
, vol.26
, Issue.5
, pp. 423-433
-
-
Lin, L.C.1
Ou, H.H.2
Hwang, M.S.3
-
21
-
-
38249003211
-
Access control in a hierarchy using a one-way trapdoor function
-
Chang, C. C., and Buehrer, D. J., Access control in a hierarchy using a one-way trapdoor function. Comput. Math. Appl. 26(5):71-76, 1993.
-
(1993)
Comput. Math. Appl.
, vol.26
, Issue.5
, pp. 71-76
-
-
Chang, C.C.1
Buehrer, D.J.2
|