메뉴 건너뛰기




Volumn , Issue , 2011, Pages 17-23

Controlled data sharing in E-health

Author keywords

[No Author keywords available]

Indexed keywords

CLINICAL INFORMATION; ELECTRONIC FORMATS; ELECTRONIC PATIENT RECORD; FORMAL FRAMEWORK; HEALTHCARE ORGANIZATIONS; INFORMATION SHARED; INFORMATION SHARING; SECURITY REQUIREMENTS;

EID: 84871953667     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/STAST.2011.6059251     Document Type: Conference Paper
Times cited : (17)

References (11)
  • 1
    • 0029697680 scopus 로고    scopus 로고
    • A security policy model for clinical information systems
    • IEEE Compute Society Press
    • R. J. Anderson, "A security policy model for clinical information systems," in IEEE Symposium on Security and Privacy. IEEE Compute Society Press, 1996, pp. 30-42.
    • (1996) IEEE Symposium on Security and Privacy , pp. 30-42
    • Anderson, R.J.1
  • 3
    • 33645344483 scopus 로고    scopus 로고
    • A review of security of electronic health records
    • K. T. Win, "A review of security of electronic health records," Health Information Management, vol. 34, no. 1, pp. 13-18, 2005.
    • (2005) Health Information Management , vol.34 , Issue.1 , pp. 13-18
    • Win, K.T.1
  • 4
    • 77955187559 scopus 로고    scopus 로고
    • Security in pervasive health care networks: Current R&D and future challenges
    • D. Acharya, "Security in pervasive health care networks: Current R&D and future challenges," in Mobile Data Management, 2010, pp. 305-306.
    • (2010) Mobile Data Management , pp. 305-306
    • Acharya, D.1
  • 5
    • 77952740616 scopus 로고    scopus 로고
    • Exploring how security features affect the use of electronic health records
    • B. Hewitt, "Exploring how security features affect the use of electronic health records," Healthcare Technology and Management, vol. 11, no. 1/2, pp. 31-49, 2010.
    • (2010) Healthcare Technology and Management , vol.11 , Issue.1-2 , pp. 31-49
    • Hewitt, B.1
  • 6
    • 33644533495 scopus 로고    scopus 로고
    • Formal specification of role-based security policies for clinical information systems
    • K. Sohr, M. Drouineaud, and G. Ahn., "Formal specification of role-based security policies for clinical information systems," in SAC: Security Track. ACM, 2005, pp. 332-339.
    • (2005) SAC: Security Track. ACM , pp. 332-339
    • Sohr, K.1    Drouineaud, M.2    Ahn, G.3
  • 10
    • 0024140798 scopus 로고
    • A modal process logic
    • K. G. Larsen and B. Thomsen, "A modal process logic," in LICS, 1988, pp. 203-210.
    • (1988) LICS , pp. 203-210
    • Larsen, K.G.1    Thomsen, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.