-
1
-
-
33644636271
-
Electronic Medical Record Reminder Improves Osteoporosis Management after A Fracture: A Randomized, Controlled Trial
-
A. Feldstein, P. Elmer, D. Smith, M. Herson, E. Orwoll, C. Chen, M. Aickin, and M. Swain, "Electronic Medical Record Reminder Improves Osteoporosis Management After a Fracture: A Randomized, Controlled Trial," J. Am. Geriatrics Soc., vol. 54, no. 3, pp. 450-457, 2006.
-
(2006)
J. Am. Geriatrics Soc.
, vol.54
, Issue.3
, pp. 450-457
-
-
Feldstein, A.1
Elmer, P.2
Smith, D.3
Herson, M.4
Orwoll, E.5
Chen, C.6
Aickin, M.7
Swain, M.8
-
2
-
-
84866922647
-
-
last accessed on Jan. 2011
-
http://www.amconmag.com/article/2009/mar/09/00009/, last accessed on Jan. 2011.
-
-
-
-
5
-
-
55549122324
-
Situation-based access control: Privacy management via modeling of patient data access scenarios
-
M. Peleg, D. Beimel, D. Dori, and Y. Denekamp, "Situation-Based Access Control: Privacy Management via Modeling of Patient Data Access Scenarios," J. Biomedical Informatics, vol. 41, no. 6, pp. 1028-1040, 2008.
-
(2008)
J. Biomedical Informatics
, vol.41
, Issue.6
, pp. 1028-1040
-
-
Peleg, M.1
Beimel, D.2
Dori, D.3
Denekamp, Y.4
-
6
-
-
74049110390
-
Patient controlled encryption: Ensuring privacy of electronic medical records
-
J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, "Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records," Proc. ACM Workshop Cloud Computing Security, pp. 103-114, 2009.
-
(2009)
Proc. ACM Workshop Cloud Computing Security
, pp. 103-114
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
7
-
-
84866905853
-
-
last accessed on 2011
-
"Emr Data Theft Booming," http://www.informationweek.com/ news/healthcare/security-privacy/showArticle.jhtml?articleID= 224200494, last accessed on 2011.
-
Emr Data Theft Booming
-
-
-
8
-
-
84866907545
-
-
last accessed on 2011
-
http://www.dailymail.co.uk/news/article-1221186, last accessed on 2011.
-
-
-
-
9
-
-
84866905852
-
-
last accessed on 2010
-
http://www.medicexchange.com/EMR/emr-data-theftincreasing-in-us.html, last accessed on 2010.
-
-
-
-
10
-
-
84866905853
-
-
last accessed on 2011
-
"Emr Data Theft Booming," http://www.healthcareitnews.com/news/ patients-sue-walgreens-making-money-their-data, last accessed on 2011.
-
Emr Data Theft Booming
-
-
-
11
-
-
84866922642
-
-
last accessed on 2011
-
http://www.theregister.co.uk/2005/04/15/ralph-lauren-loses-data/, last accessed on 2011.
-
-
-
-
13
-
-
10944220833
-
Rights protection for relational data
-
Dec.
-
R. Sion, M. Atallah, and S. Prabhakar, "Rights Protection for Relational Data," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 12, pp. 1509-1525, Dec. 2004.
-
(2004)
IEEE Trans. Knowledge and Data Eng.
, vol.16
, Issue.12
, pp. 1509-1525
-
-
Sion, R.1
Atallah, M.2
Prabhakar, S.3
-
14
-
-
36649016018
-
Watermarking relational databases using optimization-based techniques
-
Jan.
-
M. Shehab, E. Bertino, and A. Ghafoor, "Watermarking Relational Databases Using Optimization-Based Techniques," IEEE Trans. Knowledge and Data Eng., vol. 20, no. 1, pp. 116-129, Jan. 2008.
-
(2008)
IEEE Trans. Knowledge and Data Eng.
, vol.20
, Issue.1
, pp. 116-129
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
-
15
-
-
0041513205
-
Watermarking relational data: Framework, algorithms and analysis
-
R. Agrawal, P. Haas, and J. Kiernan, "Watermarking Relational Data: Framework, Algorithms and Analysis," The VLDB J., vol. 12, no. 2, pp. 157-169, 2003
-
(2003)
The VLDB J.
, vol.12
, Issue.2
, pp. 157-169
-
-
Agrawal, R.1
Haas, P.2
Kiernan, J.3
-
17
-
-
28844454271
-
A comparison of particle swarm optimization and the genetic algorithm
-
R. Hassan, B. Cohanim, O. De Weck, and G. Venter, "A Comparison of Particle Swarm Optimization and the Genetic Algorithm," Proc. 46th AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics, and Materials Conf., pp. 1-13, 2005.
-
(2005)
Proc. 46th AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics, and Materials Conf.
, pp. 1-13
-
-
Hassan, R.1
Cohanim, B.2
De Weck, O.3
Venter, G.4
-
18
-
-
0034199979
-
Comparison of multiobjective evolutionary algorithms: Empirical results
-
E. Zitzler, K. Deb, and L. Thiele, "Comparison of Multiobjective Evolutionary Algorithms: Empirical Results," Evolutionary Computation, vol. 8, no. 2, pp. 173-195, 2000.
-
(2000)
Evolutionary Computation
, vol.8
, Issue.2
, pp. 173-195
-
-
Zitzler, E.1
Deb, K.2
Thiele, L.3
-
19
-
-
33947604749
-
A weighted algorithm for watermarking relational databases
-
X. Cui, X. Qin, and G. Sheng, "A Weighted Algorithm for Watermarking Relational Databases," Wuhan Univ. J. Natural Sciences, vol. 12, no. 1, pp. 79-82, 2007.
-
(2007)
Wuhan Univ. J. Natural Sciences
, vol.12
, Issue.1
, pp. 79-82
-
-
Cui, X.1
Qin, X.2
Sheng, G.3
-
20
-
-
18844420548
-
Tamper detection and localization for categorical data using fragile watermarks
-
Y. Li, H. Guo, and S. Jajodia, "Tamper Detection and Localization for Categorical Data Using Fragile Watermarks," Proc. Fourth ACM Workshop Digital Rights Management, pp. 73-82, 2004.
-
(2004)
Proc. Fourth ACM Workshop Digital Rights Management
, pp. 73-82
-
-
Li, Y.1
Guo, H.2
Jajodia, S.3
-
21
-
-
19944413957
-
Fingerprinting relational databases: Schemes and specialties
-
Jan.-Mar.
-
Y. Li, V. Swarup, and S. Jajodia, "Fingerprinting Relational Databases: Schemes and Specialties," IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, pp. 34-45, Jan.-Mar. 2005.
-
(2005)
IEEE Trans. Dependable and Secure Computing
, vol.2
, Issue.1
, pp. 34-45
-
-
Li, Y.1
Swarup, V.2
Jajodia, S.3
-
22
-
-
74049137784
-
Watermarking relational databases for ownership protection based on dwt
-
C. Jiang, X. Chen, and Z. Li, "Watermarking Relational Databases for Ownership Protection Based on DWT," Proc. Fifth Int'l Conf. Information Assurance and Security, vol. 1, pp. 305-308, 2009.
-
(2009)
Proc. Fifth Int'l Conf. Information Assurance and Security
, vol.1
, pp. 305-308
-
-
Jiang, C.1
Chen, X.2
Li, Z.3
-
23
-
-
0026988817
-
Genetic algorithms
-
J. Holland, "Genetic Algorithms," Scientific Am., vol. 267, no. 1, pp. 66-72, 1992.
-
(1992)
Scientific Am.
, vol.267
, Issue.1
, pp. 66-72
-
-
Holland, J.1
-
25
-
-
28444478342
-
Privacy and ownership preserving of outsourced medical data
-
E. Bertino, B. Ooi, Y. Yang, and R. Deng, "Privacy and Ownership Preserving of Outsourced Medical Data," Proc. 21st Int'l Conf. Data Eng. (ICDE '05), pp. 521-532, 2005.
-
(2005)
Proc. 21st Int'l Conf. Data Eng. (ICDE '05)
, pp. 521-532
-
-
Bertino, E.1
Ooi, B.2
Yang, Y.3
Deng, R.4
-
26
-
-
79952930647
-
Og-miner: An intelligent health tool for achieving millennium development goals (mdgs) in mhealth environments
-
M. Afridi and M. Farooq, "OG-Miner: An Intelligent Health Tool For Achieving Millennium Development Goals (MDGs) in MHealth Environments," Proc. 44th Hawaii Int'l Conf. Systems Sciences, 2011.
-
(2011)
Proc. 44th Hawaii Int'l Conf. Systems Sciences
-
-
Afridi, M.1
Farooq, M.2
-
29
-
-
0037411386
-
Genetic algorithms in computer aided design
-
G. Renner and A. Ekart, "Genetic Algorithms in Computer Aided Design," Computer-Aided Design, vol. 35, no. 8, pp. 709-726, 2003.
-
(2003)
Computer-Aided Design
, vol.35
, Issue.8
, pp. 709-726
-
-
Renner, G.1
Ekart, A.2
-
30
-
-
22344432656
-
Comparison among five evolutionary-based optimization algorithms
-
E. Elbeltagi, T. Hegazy, and D. Grierson, "Comparison among Five Evolutionary-Based Optimization Algorithms," Advanced Eng. Informatics, vol. 19, no. 1, pp. 43-53, 2005.
-
(2005)
Advanced Eng. Informatics
, vol.19
, Issue.1
, pp. 43-53
-
-
Elbeltagi, E.1
Hegazy, T.2
Grierson, D.3
|