메뉴 건너뛰기




Volumn 36, Issue 6, 2012, Pages 3839-3850

Secure communication of medical information using mobile agents

Author keywords

Elliptic curve cryptosystem; Man in the middle attack; Medical information security; Mobile agent

Indexed keywords

COMPUTATIONAL FLUID DYNAMICS; COMPUTER SECURITY; CONCEPTUAL FRAMEWORK; CONFERENCE PAPER; CRYPTOSYSTEM; HEALTH CARE COST; HEALTH CARE QUALITY; HUMAN; MEDICAL INFORMATION; MEDICAL INFORMATION SYSTEM; MEDICINE; MOBILE PHONE; PATIENT CARE; PATIENT INFORMATION;

EID: 84867860941     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-012-9857-8     Document Type: Conference Paper
Times cited : (25)

References (30)
  • 1
    • 84871684669 scopus 로고    scopus 로고
    • Deployment of secure mobile agents for medical information systems
    • doi: 10.1007/s10916-011-9716-z
    • Chen, T. L.; Chung, Y. F.; and Lin, F. Y. S.; Deployment of secure mobile agents for medical information systems. J. Med. Syst.; 2011. doi: 10.1007/s10916-011-9716-z.
    • (2011) J. Med. Syst.
    • Chen, T.L.1    Chung, Y.F.2    Lin, F.Y.S.3
  • 3
    • 0035917655 scopus 로고    scopus 로고
    • Mobile agents: An introduction
    • 10.1016/S0141-9331(01)00099-0
    • Gian, P. P.; Mobile agents: An introduction. Microprocess. Microsyst. 25:65-74, 2001.
    • (2001) Microprocess. Microsyst. , vol.25 , pp. 65-74
    • Gian, P.P.1
  • 4
    • 38849139678 scopus 로고    scopus 로고
    • Reducing inference control to access control for normalized database schemas
    • 2388983 1186.68157 10.1016/j.ipl.2007.09.007
    • Biskup, J.; Embley, D. W.; and Lochner, J. H.; Reducing inference control to access control for normalized database schemas. Inf. Process. Lett. 106:8-12, 2008.
    • (2008) Inf. Process. Lett. , vol.106 , pp. 8-12
    • Biskup, J.1    Embley, D.W.2    Lochner, J.H.3
  • 5
    • 33746169048 scopus 로고    scopus 로고
    • Secure brokerage mechanisms for mobile electronic commerce
    • 10.1016/j.comcom.2006.03.005
    • Esparza, O.; Muñoz, J. L.; Soriano, M.; and Forné, J.; Secure brokerage mechanisms for mobile electronic commerce. Comput. Commun. 29:2308-2321, 2006.
    • (2006) Comput. Commun. , vol.29 , pp. 2308-2321
    • Esparza, O.1    Muñoz, J.L.2    Soriano, M.3    Forné, J.4
  • 6
    • 79953730258 scopus 로고    scopus 로고
    • An agent-based English auction protocol using elliptic curve cryptosystem for mobile commerce
    • 10.1016/j.eswa.2011.02.039
    • Chung, Y. F.; Chen, Y. T.; Chen, T. L.; and Chen, T. S.; An agent-based English auction protocol using elliptic curve cryptosystem for mobile commerce. Expert Syst. Appl. 38(8):9900-9907, 2011.
    • (2011) Expert Syst. Appl. , vol.38 , Issue.8 , pp. 9900-9907
    • Chung, Y.F.1    Chen, Y.T.2    Chen, T.L.3    Chen, T.S.4
  • 7
    • 79551555868 scopus 로고    scopus 로고
    • An efficient blind signature scheme based on the elliptic curve discrete logarithm problem
    • Nikooghadam, M.; and Zakerolhosseini, A.; An efficient blind signature scheme based on the elliptic curve discrete logarithm problem. ISecure: ISC Int'l J. Inf. Secur. 8(10):125-131, 2009.
    • (2009) ISecure: ISC Int'l J. Inf. Secur. , vol.8 , Issue.10 , pp. 125-131
    • Nikooghadam, M.1    Zakerolhosseini, A.2
  • 8
    • 34250306664 scopus 로고    scopus 로고
    • Threshold cryptography in P2P and MANETs: The case of access control
    • 1118.68484 10.1016/j.comnet.2007.03.001
    • Saxena, N.; Tsudik, G.; and Yi, J. H.; Threshold cryptography in P2P and MANETs: The case of access control. Comput. Netw. 51:3632-3649, 2007.
    • (2007) Comput. Netw. , vol.51 , pp. 3632-3649
    • Saxena, N.1    Tsudik, G.2    Yi, J.H.3
  • 9
    • 33646842835 scopus 로고    scopus 로고
    • HL7 ontology and mobile agents for interoperability in heterogeneous medical information systems
    • 10.1016/j.compbiomed.2005.04.010
    • Orgun, B.; and Vu, J.; HL7 ontology and mobile agents for interoperability in heterogeneous medical information systems. Comput. Biol. Med. 36:817-836, 2006.
    • (2006) Comput. Biol. Med. , vol.36 , pp. 817-836
    • Orgun, B.1    Vu, J.2
  • 10
    • 84873031582 scopus 로고    scopus 로고
    • An efficient key-management scheme for hierarchical access control in e-medicine system
    • Springer, doi: 10.1007/s10916-011-9700-7
    • Wu, S.; and Chen K. An efficient key-management scheme for hierarchical access control in e-medicine system. J. Med. Syst.; Springer, doi: 10.1007/s10916-011-9700-7, 2011.
    • (2011) J. Med. Syst.
    • Wu, S.1    Chen, K.2
  • 11
    • 2342658269 scopus 로고    scopus 로고
    • Two secure transportation schemes for mobile agents
    • Lin, I. C.; Ou, H. H.; and Hwang, M. S.; Two secure transportation schemes for mobile agents. Int. J. Inf. Secur. 8:87-97, 2002.
    • (2002) Int. J. Inf. Secur. , vol.8 , pp. 87-97
    • Lin, I.C.1    Ou, H.H.2    Hwang, M.S.3
  • 14
    • 0032121340 scopus 로고    scopus 로고
    • Access control and key management for mobile agents
    • 10.1016/S0097-8493(98)00035-1
    • Volker, R.; and Mehrdad, J. S.; Access control and key management for mobile agents. Comput. Graph. 22:457-461, 1998.
    • (1998) Comput. Graph. , vol.22 , pp. 457-461
    • Volker, R.1    Mehrdad, J.S.2
  • 15
    • 32644451622 scopus 로고    scopus 로고
    • A new solution for assigning cryptographic keys to control access in mobile agent environments
    • 10.1002/wcm.276
    • Chang, C. C.; and Lin, I. C.; A new solution for assigning cryptographic keys to control access in mobile agent environments. Wirel. Commun. Mob. Comput. 6:137-146, 2006.
    • (2006) Wirel. Commun. Mob. Comput. , vol.6 , pp. 137-146
    • Chang, C.C.1    Lin, I.C.2
  • 16
    • 54349095337 scopus 로고    scopus 로고
    • Efficient migration for mobile computing in distributed networks
    • 10.1016/j.csi.2007.10.011
    • Huang, K. H.; Chung, Y. F.; Liu, C. H.; Lai, F.; and Chen, T. S.; Efficient migration for mobile computing in distributed networks. Comput. Stand. Int. 31:40-47, 2009.
    • (2009) Comput. Stand. Int. , vol.31 , pp. 40-47
    • Huang, K.H.1    Chung, Y.F.2    Liu, C.H.3    Lai, F.4    Chen, T.S.5
  • 17
    • 0043135196 scopus 로고    scopus 로고
    • Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments
    • 10.1016/S1363-4127(97)81331-3
    • Vanstone, S. A.; Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments. Inf. Secur. Tech. Rep. 12:78-87, 1997.
    • (1997) Inf. Secur. Tech. Rep. , vol.12 , pp. 78-87
    • Vanstone, S.A.1
  • 19
    • 84864031689 scopus 로고    scopus 로고
    • Mobile agent application and integration in electronic anamnesis system
    • doi: 10.1007/s10916-010-9563-3
    • Liu, C. H.; Chung, Y. F.; Chen, Th, and De Wang, S.; Mobile agent application and integration in electronic anamnesis system. J. Med. Syst.; 2011. doi: 10.1007/s10916-010-9563-3.
    • (2011) J. Med. Syst.
    • Liu, C.H.1    Chung, Y.F.2    Th, C.3    De Wang, S.4
  • 21
    • 77956061440 scopus 로고    scopus 로고
    • Efficient utilization of elliptic curve cryptosystem for hierarchical access control
    • 10.1016/j.jss.2010.05.072
    • Nikooghadam, M.; Zakerolhosseini, A.; and Ebrahimi Moghadam, M.; Efficient utilization of elliptic curve cryptosystem for hierarchical access control. J. Syst. Softw. 83:1917-1929, 2010.
    • (2010) J. Syst. Softw. , vol.83 , pp. 1917-1929
    • Nikooghadam, M.1    Zakerolhosseini, A.2    Ebrahimi Moghadam, M.3
  • 24
    • 46149115413 scopus 로고    scopus 로고
    • A protocol for digital signature based on the elliptic curve discrete logarithm problem
    • 10.3923/jas.2008.1919.1925
    • Nikooghadam, M.; Bonyadi, M. R.; Malekian, E.; and Zakerolhosseini, A.; A protocol for digital signature based on the elliptic curve discrete logarithm problem. J. Appl. Sci. 8(10):1919-1925, 2008.
    • (2008) J. Appl. Sci. , vol.8 , Issue.10 , pp. 1919-1925
    • Nikooghadam, M.1    Bonyadi, M.R.2    Malekian, E.3    Zakerolhosseini, A.4
  • 25
    • 0019693723 scopus 로고
    • Probabilistic Algorithms in Finite Fields
    • Nashville, Tennessee, USA, 28-30 October
    • Ben-Or, M.; Probabilistic Algorithms in Finite Fields, 22nd Annual Symposium on Foundations of Computer Science, Nashville, Tennessee, USA, 28-30 October 1981, pp. 394-398.
    • (1981) 22nd Annual Symposium on Foundations of Computer Science , pp. 394-394
    • Ben-Or, M.1
  • 27
    • 79751531498 scopus 로고    scopus 로고
    • Secure key management scheme for dynamic hierarchical access control based on ECC
    • 10.1016/j.jss.2010.11.926
    • Lin, Y. L.; and Hsu, C. L.; Secure key management scheme for dynamic hierarchical access control based on ECC. J. Syst. Softw. 84:679-685, 2011.
    • (2011) J. Syst. Softw. , vol.84 , pp. 679-685
    • Lin, Y.L.1    Hsu, C.L.2
  • 28
    • 0348003132 scopus 로고    scopus 로고
    • The state of elliptic curve cryptography
    • 1759616 0996.94032 10.1023/A:1008354106356
    • Koblitz, N.; Menezes, A.; and Vanstone, S. A.; The state of elliptic curve cryptography. Des. Code Crypt. 19:173-193, 2000.
    • (2000) Des. Code Crypt. , vol.19 , pp. 173-193
    • Koblitz, N.1    Menezes, A.2    Vanstone, S.A.3
  • 29
    • 84864069578 scopus 로고    scopus 로고
    • A study on agent-based secure scheme for electronic medical record system
    • doi: 10.1007/s10916-010-9595-8
    • Chen, T. L.; Chung, Y. F.; and Lin, F. Y. S.; A study on agent-based secure scheme for electronic medical record system. J. Med. Syst.; 2010. doi: 10.1007/s10916-010-9595-8.
    • (2010) J. Med. Syst.
    • Chen, T.L.1    Chung, Y.F.2    Lin, F.Y.S.3
  • 30
    • 84867288768 scopus 로고    scopus 로고
    • A Mobile Agent Approach for Secure Integrated Medical Information Systems
    • doi: 10.1007/s10916-011-9749-3
    • Liu, C.H.; Chung, Y.F.; Chiang, T.W.; T.S.; Chen, and Wang, S.D.; A Mobile Agent Approach for Secure Integrated Medical Information Systems. J of Med Syst.; 2011, doi: 10.1007/s10916-011-9749-3.
    • (2011) J of Med Syst.
    • Liu, C.H.1    Chung, Y.F.2    Chiang, T.W.3    Chen, T.S.4    Wang, S.D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.