-
1
-
-
59349103556
-
Interorganizational future proof ehr systems: A review of the security and privacy related issues
-
van der Linden, H., Kalra, D., Hasman, A., and Talmon, J., Interorganizational future proof EHR systems: A review of the security and privacy related issues. Int. J. Med. Inform. 78(3):141-160, 2009.
-
(2009)
Int. J. Med. Inform.
, vol.78
, Issue.3
, pp. 141-160
-
-
Van Der Linden, H.1
Kalra, D.2
Hasman, A.3
Talmon, J.4
-
2
-
-
79952064844
-
Securing access to healthcare
-
David, T., Securing access to healthcare. Biom Technol Today 2011(2):10-11, 2011.
-
(2011)
Biom Technol Today
, vol.2011
, Issue.2
, pp. 10-11
-
-
David, T.1
-
4
-
-
0032006377
-
Standardization and security for the EMR
-
Toyoda, K., Standardization and security for the EMR. Int. J. Med. Inform. 48(1-3):57-60, 1998.
-
(1998)
Int. J. Med. Inform.
, vol.48
, Issue.1-3
, pp. 57-60
-
-
Toyoda, K.1
-
5
-
-
34047122001
-
A notary archivemodel for secure preservation and distribution of electrically signed patient documents
-
Ruotsalainen, P., andManning, B., A notary archivemodel for secure preservation and distribution of electrically signed patient documents. Int. J. Med. Inform. 76(5-6):449-453, 2007.
-
(2007)
Int. J. Med. Inform.
, vol.76
, Issue.5-6
, pp. 449-453
-
-
Ruotsalainen, P.1
Manning, B.2
-
6
-
-
84862787615
-
Electronic medical record quality and its impact on user satisfaction
-
Chang, I. C., Li, Y.-C.,Wu, T.-Y., and Yen, D. C., Electronic medical record quality and its impact on user satisfaction -Healthcare providers' point of view. Gov. Inf. Q. 29(2):235-242, 2012.
-
(2012)
Healthcare providers' point of view. Gov. Inf. Q.
, vol.29
, Issue.2
, pp. 235-242
-
-
Chang, I.C.1
Li, Y.-C.2
Wu, T.-Y.3
Yen, D.C.4
-
7
-
-
84882534460
-
-
Academic Press, New York
-
Beahan, S., In: Thomas, P. (Ed.), 10 -Legal Issues in Medical Records/Health Information Management, in Practical Guide to Clinical Computing Systems. Academic Press, New York, pp. 171-180, 2008.
-
(2008)
10 -Legal Issues in Medical Records/Health Information Management, in Practical Guide to Clinical Computing Systems.
, pp. 171-180
-
-
Beahan, S.1
Thomas, P.2
-
8
-
-
79952064844
-
Securing access to healthcare
-
Ting, D., Securing access to healthcare. Biom Technol Today 2011(2):10-11, 2011.
-
(2011)
Biom Technol Today
, vol.2011
, Issue.2
, pp. 10-11
-
-
Ting, D.1
-
9
-
-
33947651649
-
Long-Termverifiability of the electronic healthcare records' authenticity
-
Lekkas, D., andGritzalis, D., Long-Termverifiability of the electronic healthcare records' authenticity. Int. J. Med. Inform. 76(5-6):442-448, 2007.
-
(2007)
Int. J. Med. Inform.
, vol.76
, Issue.5-6
, pp. 442-448
-
-
Lekkas, D.1
Gritzalis, D.2
-
10
-
-
78751706184
-
Views on health information sharing and privacy from primary care practices using electronic medical records
-
Perera, G., Holbrook, A., Thabane, L., Foster, G., andWillison, D. J., Views on health information sharing and privacy from primary care practices using electronic medical records. Int. J. Med. Inform. 80(2): 94-101, 2011.
-
(2011)
Int. J. Med. Inform.
, vol.80
, Issue.2
, pp. 94-101
-
-
Perera, G.1
Holbrook, A.2
Thabane, L.3
Foster, G.4
Willison, D.J.5
-
11
-
-
33744919262
-
Taiwan's perspective on electronic medical records' security and privacy protection: Lessons learned from hipaa
-
Yang, C.-M., Lin, H.-C., Chang, P., and Jian, W.-S., Taiwan's perspective on electronic medical records' security and privacy protection: Lessons learned from HIPAA. Comput.Methods Prog. Biomed. 82(3):277-282, 2006.
-
(2006)
Comput.Methods Prog. Biomed.
, vol.82
, Issue.3
, pp. 277-282
-
-
Yang, C.-M.1
Lin, H.-C.2
Chang, P.3
Jian, W.-S.4
-
12
-
-
55549122324
-
Situation-based access control: Privacy management via modeling of patient data access scenarios
-
Peleg, M., Beimel, D., Dori, D., and Denekamp, Y., Situation-based access control: Privacy management via modeling of patient data access scenarios. J. Biomed. Inform. 41(6):1028-1040, 2008.
-
(2008)
J. Biomed. Inform.
, vol.41
, Issue.6
, pp. 1028-1040
-
-
Peleg, M.1
Beimel, D.2
Dori, D.3
Denekamp, Y.4
-
13
-
-
0042703504
-
Emr confidentiality and information security
-
Kurtz, G., EMR confidentiality and information security. J. Healthc. Inf. Manag.: JHIM 17(3):41-48, 2003.
-
(2003)
J. Healthc. Inf. Manag.: JHIM
, vol.17
, Issue.3
, pp. 41-48
-
-
Kurtz, G.1
-
14
-
-
57349200762
-
Confidentiality, and electronic medical records
-
Barrows, R. C., and Clayton, P. D., Privacy, confidentiality, and electronic medical records. J. Am. Med. Inf. Assoc. 3(2):139-148, 1996.
-
(1996)
J. Am. Med. Inf. Assoc.
, vol.3
, Issue.2
, pp. 139-148
-
-
Barrows, R.C.1
Clayton, P.2
Privacy, D.3
-
15
-
-
6344284901
-
Physician and nurse satisfaction with an electronic medical record system
-
Likourezos, A., Chalfin, D. B., Murphy, D. G., Sommer, B., Darcy, K., and Davidson, S. J., Physician and nurse satisfaction with an Electronic Medical Record system. J. Emerg. Med. 27(4):419-424, 2004.
-
(2004)
J. Emerg. Med.
, vol.27
, Issue.4
, pp. 419-424
-
-
Likourezos, A.1
Chalfin, D.B.2
Murphy, D.G.3
Sommer, B.4
Darcy, K.5
Davidson, S.J.6
-
16
-
-
80052919351
-
-
Academic Press, Burlington
-
Lim, E. Y. S., In: David Dagan, F. (Ed.), 11 -Data Security and Protection for Medical Images, in Biomedical Information Technology. Academic Press, Burlington, pp. 249-257, 2008.
-
(2008)
11 -Data Security and Protection for Medical Images, in Biomedical Information Technology.
, pp. 249-257
-
-
Lim, E.Y.S.1
David Dagan, F.2
-
17
-
-
1842422502
-
He malaysian telehealth flagship application: A national approach to health data protection and utilisation and consumer rights
-
Mohan, J., and Razali Raja Yaacob, R., The Malaysian Telehealth Flagship Application: A national approach to health data protection and utilisation and consumer rights. Int. J. Med. Inform. 73(3):217-227, 2004.
-
(2004)
Int. J. Med. Inform.
, vol.73
, Issue.3
, pp. 217-227
-
-
Mohan, J.1
Razali Raja Yaacob, R.2
-
19
-
-
0033978991
-
Framework for a clinical information system
-
Van de Velde, R., Framework for a clinical information system. Int. J. Med. Inform. 57(1):57-72, 2000.
-
(2000)
Int. J. Med. Inform.
, vol.57
, Issue.1
, pp. 57-72
-
-
Van De Velde, R.1
-
20
-
-
84866175587
-
Effects of electronic medical record in a chinese hospital: A time series study
-
Xue, Y., Liang, H., Wu, X., Gong, H., Li, B., and Zhang, Y., Effects of electronic medical record in a Chinese hospital: A time series study. Int. J. Med. Inform. 81(10):683-689, 2012.
-
(2012)
Int. J. Med. Inform.
, vol.81
, Issue.10
, pp. 683-689
-
-
Xue, Y.1
Liang, H.2
Wu, X.3
Gong, H.4
Li, B.5
Zhang, Y.6
-
21
-
-
77953551233
-
The case for electronic medical records-why the time to act is now
-
Zimmerman, T. G., The case for electronic medical records-why the time to act is now. Osteopath. Fam. Physician 2(4):108-113, 2010.
-
(2010)
Osteopath. Fam. Physician
, vol.2
, Issue.4
, pp. 108-113
-
-
Zimmerman, T.G.1
-
22
-
-
77951646550
-
Partnering to enhance the nursing curriculum: Electronic medical record accessibility
-
Lucas, L., Partnering to enhance the nursing curriculum: Electronic medical record accessibility. Clin. Simul. Nurs. 6(3):e97-e102, 2010.
-
(2010)
Clin. Simul. Nurs.
, vol.6
, Issue.3
-
-
Lucas, L.1
-
23
-
-
13444251294
-
Using qualitative studies to improve the usability of an emr
-
Rose, A. F., Schnipper, J. L., Park, E. R., Poon, E. G., Li, Q., and Middleton, B.,Using qualitative studies to improve the usability of an EMR. J. Biomed. Inform. 38(1):51-60, 2005.
-
(2005)
J. Biomed. Inform.
, vol.38
, Issue.1
, pp. 51-60
-
-
Rose, A.F.1
Schnipper, J.L.2
Park E, R.3
Poon, E.G.4
Li, Q.5
Middleton, B.6
-
24
-
-
0033135664
-
Variation in health care-The roles of the electronic medical record
-
Hannan, T. J., Variation in health care-The roles of the electronic medical record. Int. J. Med. Inform. 54(2):127-136, 1999.
-
(1999)
Int. J. Med. Inform.
, vol.54
, Issue.2
, pp. 127-136
-
-
Hannan, T.J.1
-
25
-
-
0035798841
-
Public standards and patients' control: How tlo keep electronic medical records accessible but privatemedical information: Access and privacydoctrines for developing electronic medical recordsdesirable characteristics of electronic medical recordschallenges and limitations for electronic medical recordsconclusionscommentary
-
Mandl, K. D.,Szolovits, P.,Kohane, I.S.,Markwell, D., andMacDonald, R., Public standards and patients' control: how to keep electronic medical records accessible but privateMedical information: access and privacyDoctrines for developing electronic medical recordsDesirable characteristics of electronic medical recordsChallenges and limitations for electronic medical recordsConclusionsCommentary: Open approaches to electronic patient recordsCommentary: A patient's viewpoint. Bmj 322(7281):283-287, 2001.
-
(2001)
Bmj
, vol.322
, Issue.7281
, pp. 283-287
-
-
Mandl, K.D.1
Szolovits, P.2
Kohane, I.S.3
Markwell, D.4
MacDonald, R.5
-
26
-
-
0032031232
-
A secure model for communication of health care information by sub-division of information and multiplication of communication paths
-
Ishida, Y., and Sakamoto, N., A secure model for communication of health care information by sub-division of information and multiplication of communication paths. Int. J. Med. Inform. 49(1):75, 1998.
-
(1998)
Int. J. Med. Inform.
, vol.49
, Issue.1
, pp. 75
-
-
Ishida, Y.1
Sakamoto, N.2
-
27
-
-
0036394536
-
Electronic signature of medical documentsintegration and evaluation of a public key infrastructure in hospitals
-
Brandner, R., Van der Haak, M., Hartmann, M., Haux, R., and Schmucker, P., Electronic signature of medical documentsintegration and evaluation of a public key infrastructure in hospitals. Methods Inf. Med. 41(4):321-330, 2002.
-
(2002)
Methods Inf. Med.
, vol.41
, Issue.4
, pp. 321-330
-
-
Brandner, R.1
Van Der Haak, M.2
Hartmann, M.3
Haux, R.4
Schmucker, P.5
-
28
-
-
84892610724
-
-
Beyer, A., Hellmann, S., Hesse,M., Holl, F. L.,Morcinek, P., Paulus, S., Reimer, H., Dahms, M., Kausmann, K., and Friedrich-Meier S., Criteria for success of identification, authentication and signing methods based on asymmetric cryptographic algorithms (EKIAS). 2007.
-
(2007)
Criteria for Success of Identification, Authentication and Signing Methods Based on Asymmetric Cryptographic Algorithms (EKIAS).
-
-
Beyer, A.1
Hellmann, S.2
Hesse, M.3
Holl, F.L.4
Morcinek, P.5
Paulus, S.6
Reimer, H.7
Dahms, M.8
Kausmann, K.9
Friedrich-Meier, S.10
-
30
-
-
84937418785
-
-
Springer-Verlag.
-
Boneh, D., Joux, A., and Nguyen, P. Q., Why Textbook ElGamal and RSA Encryption Are Insecure, in Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, Springer-Verlag. p. 30-43,2000.
-
(2000)
Why Textbook ElGamal and RSA Encryption Are Insecure, in Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
, pp. 30-43
-
-
Boneh, D.1
Joux, A.2
Nguyen, P.Q.3
-
32
-
-
70349971698
-
Still guarding secrets after years of attacks, rsa earns accolades for its founders
-
Robinson, S., Still guarding secrets after years of attacks, rsa earns accolades for its founders. SIAM News 36(5):1-4, 2003.
-
(2003)
SIAM News
, vol.36
, Issue.5
, pp. 1-4
-
-
Robinson, S.1
-
33
-
-
84892590340
-
Recent developments in cryptography
-
Lenstra, A. K., Recent developments in cryptography. Information Security Summit, p. 30-31, 2001.
-
(2001)
Information Security Summit
, pp. 30-31
-
-
Lenstra, A.K.1
-
34
-
-
0000653210
-
Selecting cryptographic key sizes
-
Lenstra, A. K., and Verheul, E. R., Selecting cryptographic key sizes. J. Cryptol. 14(4):255-293, 2001.
-
(2001)
J. Cryptol.
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
38
-
-
24644498798
-
Strong authentication for rfid systems using the aes algorithm
-
Feldhofer, M., Dominikus, S., and Wolkerstorfer, J., Strong authentication for RFID systems using the AES algorithm. Cryptogr. Hardw. Embed. Syst.-CHES 2004:85-140, 2004.
-
(2004)
Cryptogr. Hardw. Embed. Syst.-CHES
, vol.2004
, pp. 85-140
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
39
-
-
79957657234
-
Review of mobile short message service security issues and techniques towards the solution
-
Medani, A., Gani, A., Zakaria, O., Zaidan, A., and Zaidan, B., Review of mobile short message service security issues and techniques towards the solution. Sci. Res. Essays 6(6):1147-1165, 2011.
-
(2011)
Sci. Res. Essays
, vol.6
, Issue.6
, pp. 1147-1165
-
-
Medani, A.1
Gani, A.2
Zakaria, O.3
Zaidan, A.4
Zaidan, B.5
-
40
-
-
4544352628
-
High-speed vlsi architectures for the aes algorithm
-
Xinmiao, Z., and Parhi, K. K., High-speed VLSI architectures for the AES algorithm. Very Large Scale Integration (VLSI) Systems. IEEE Trans. 12(9):957-967, 2004.
-
(2004)
Very Large Scale Integration (VLSI) Systems. IEEE Trans.
, vol.12
, Issue.9
, pp. 957-967
-
-
Xinmiao, Z.1
Parhi, K.K.2
-
41
-
-
33847127403
-
Pe-ice: Parallelized encryption and integrity checking engine
-
Elbaz, R., Torres, L., Sassatelli, G., Guillemin, P., and Bardouillet, M., PE-ICE: Parallelized Encryption and Integrity Checking Engine. in Design and Diagnostics of Electronic Circuits and systems, 2006 IEEE. 2006.
-
(2006)
Design and Diagnostics of Electronic Circuits and systems, 2006 IEEE.
-
-
Elbaz, R.1
Torres, L.2
Sassatelli, G.3
Guillemin, P.4
Bardouillet, M.5
-
42
-
-
80052078040
-
Low latency solution for confidentiality and integrity checking in embedded systems with off-chip memory
-
Vaslin, R., Gogniat, G., Diguet, J.-P., Tessier, R., and Burleson, W., Low latency solution for confidentiality and integrity checking in embedded systems with off-chip memory. in ReCoSoc proceeedings 2007. 2007.
-
(2007)
ReCoSoc proceeedings 2007.
-
-
Vaslin, R.1
Gogniat, G.2
Diguet, J.P.3
Tessier, R.4
Burleson, W.5
-
43
-
-
0036647823
-
The advanced encryption standard-implementation and transition to a new cryptographic benchmark
-
Asenjo, J. C., The Advanced Encryption Standard-Implementation and Transition to a New Cryptographic Benchmark. Netw. Secur. 2002(7):7-9, 2002.
-
(2002)
Netw. Secur.
, vol.2002
, Issue.7
, pp. 7-9
-
-
Asenjo, J.C.1
-
45
-
-
33645828019
-
Memory-free lowcost designs of advanced encryption standard using common subexpression elimination for subfunctions in transformations
-
Shen-Fu, H., Ming-Chih, C., and Chia-Shin, T., Memory-free lowcost designs of advanced encryption standard using common subexpression elimination for subfunctions in transformations. Circuits and Systems I: Regular Papers. IEEE Trans. 53(3):615-626, 2006.
-
(2006)
Circuits and Systems I: Regular Papers. IEEE Trans.
, vol.53
, Issue.3
, pp. 615-626
-
-
Shen-Fu, H.1
Ming-Chih, C.2
Chia-Shin, T.3
-
47
-
-
0347568494
-
J2me application-layer end-To-end security for m-commerce
-
Itani,W., and Kayssi, A., J2ME application-layer end-To-end security for m-commerce. J. Netw. Comput. Appl. 27(1):13-32, 2004.
-
(2004)
J. Netw. Comput. Appl.
, vol.27
, Issue.1
, pp. 13-32
-
-
Itani, W.1
Kayssi, A.2
-
48
-
-
84892617504
-
-
3rd Request for Comments: 3174 Motorola Category: Informational P. Jones Cisco Systems September. RFC 3174 2001
-
Eastlake, D. and Jones, P., Network Working Group D. Eastlake, 3rd Request for Comments: 3174 Motorola Category: Informational P. Jones Cisco Systems September 2001. 2001. RFC 3174.
-
(2001)
Network Working Group D. Eastlake
-
-
Eastlake, D.1
Jones, P.2
-
51
-
-
0034782005
-
Chord: A scalable peer-To-peer lookup service for internet applications
-
Stoica, I.,Morris, R., Karger, D., Kaashoek,M. F., and Balakrishnan, H., Chord: A scalable peer-To-peer lookup service for internet applications. SIGCOMM Comput. Commun. Rev. 31(4):149-160, 2001.
-
(2001)
SIGCOMM Comput. Commun. Rev.
, vol.31
, Issue.4
, pp. 149-160
-
-
Stoica I.Morris, R.1
Karger, D.2
Kaashoek, M.F.3
Balakrishnan, H.4
-
52
-
-
9644303109
-
One-way hash function construction based on the chaotic map with changeable-parameter
-
Xiao, D., Liao, X., and Deng, S., One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons Fractals 24(1):65-71, 2005.
-
(2005)
Chaos, Solitons Fractals
, vol.24
, Issue.1
, pp. 65-71
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
-
53
-
-
2442611804
-
An hmac processor with integrated sha-1 and md5 algorithms
-
Mao-Yin, W., Chih-Pin, S., Chih-Tsun, H., and Cheng-Wen, W., An HMAC processor with integrated SHA-1 and MD5 algorithms. in Design Automation Conference, 2004. Proceedings of the ASP-DAC 2004. Asia and South Pacific. 2004.
-
(2004)
Design Automation Conference, 2004. Proceedings of the ASP-DAC 2004. Asia and South Pacific
-
-
Mao-Yin, W.1
Chih-Pin, S.2
Chih-Tsun, H.3
Cheng-Wen, W.4
-
54
-
-
84892604936
-
Content protection for transmission systems
-
Traw, C. B. S., and Aucsmith, D. W., Content protection for transmission systems, Google Patents, 1999.
-
(1999)
Google Patents
-
-
Traw, C.B.S.1
Aucsmith, D.W.2
-
55
-
-
27644503128
-
Efficient implementation of the keyed-hash message authentication code (hmac) using the sha-1 hash function
-
Michail, H. E., Kakarountas, A. P., Milidonis, A., and Goutis, C. E., Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function. in Electronics, Circuits and Systems, 2004. ICECS 2004. Proceedings of the 2004 11th IEEE International Conference on. 2004.
-
(2004)
Electronics Circuits and Systems 2004. ICECS 2004., Proceedings of the 2004 11th IEEE International Conference on.
-
-
Michail, H.E.1
Kakarountas, A.P.2
Milidonis, A.3
Goutis, C.E.4
-
59
-
-
75449105062
-
-
Avila-Campillo, I., Green, T. J., Gupta, A., Onizuka, M., Raven, D., and Suciu, D., XMLTK: An XML toolkit for scalable XML stream processing. 2002.
-
(2002)
XMLTK: An XML Toolkit for scalable XML Stream Processing.
-
-
Avila-Campillo, I.1
Green, T.J.2
Gupta, A.3
Onizuka, M.4
Raven, D.5
Suciu, D.6
-
60
-
-
30944455918
-
Compression of xml physiological data streams to support neonatal intensive care unit web services
-
McGregor, C., Purdy, M., and Kneale, B., Compression of XML physiological data streams to support neonatal intensive care unit Web services. in e-Technology, e-Commerce and e-Service, 2005. EEE '05. Proceedings. The 2005 I.E. International Conference on. 2005.
-
(2005)
E-Technology, E-Commerce and E-Service, 2005. EEE '05. Proceedings. The 2005 I.E. International Conference on.
-
-
McGregor, C.1
Purdy, M.2
Kneale, B.3
-
61
-
-
34548787395
-
-
VLDB Endowment
-
Pal, S., Cseri, I., Seeliger, O., Schaller, G., Giakoumakis, L., and Zolotov, V., Indexing XML data stored in a relational database. 2004. VLDB Endowment.
-
(2004)
Indexing XML Data Stored in a Relational Database.
-
-
Pal, S.1
Cseri, I.2
Seeliger, O.3
Schaller, G.4
Giakoumakis, L.5
Zolotov, V.6
-
62
-
-
0035444728
-
Cross-platform integration with xml and soap
-
Chester, T. M., Cross-platform integration with XML and SOAP. IT Prof. 3(5):26-34, 2001.
-
(2001)
IT Prof.
, vol.3
, Issue.5
, pp. 26-34
-
-
Chester, T.M.1
-
63
-
-
0035106485
-
Xml, bioinformatics and data integration
-
Achard, F., Vaysseix, G., and Barillot, E., XML, bioinformatics and data integration. Bioinformatics 17(2):115, 2001.
-
(2001)
Bioinformatics
, vol.17
, Issue.2
, pp. 115
-
-
Achard, F.1
Vaysseix, G.2
Barillot, E.3
-
64
-
-
0036051246
-
Xml technologies to design didactical distributed measurement laboratories
-
Bagnasco, A., Chirico,M., and Scapolla, A.M.,XML technologies to design didactical distributed measurement laboratories. in Instrumentation and Measurement Technology Conference, 2002. IMTC/2002. Proceedings of the 19th IEEE. 2002.
-
(2002)
Instrumentation and Measurement Technology Conference, 2002. IMTC/2002. Proceedings of the 19th IEEE.
-
-
Bagnasco, A.1
Chirico, M.2
Scapolla, A.M.3
-
65
-
-
4243187148
-
Fulfilling the web services promise
-
Kreger, H., Fulfilling the Web services promise. Commun. ACM, 2003. 46(6): p. 29-ff.
-
(2003)
Commun. ACM
, vol.46
, Issue.6
-
-
Kreger, H.1
-
67
-
-
38949159171
-
Investigating the limits of soap performance for scientific computing
-
Chiu, K., Govindaraju, M., and Bramley, R., Investigating the limits of SOAP performance for scientific computing. in High Performance Distributed Computing, 2002. HPDC-11 2002. Proceedings. 11th IEEE International Symposium on. 2002.
-
(2002)
High Performance Distributed Computing, 2002. HPDC-11 2002. Proceedings. 11th IEEE International Symposium on.
-
-
Chiu, K.1
Govindaraju, M.2
Bramley, R.3
-
68
-
-
0013223893
-
Soap security extensions: Digital signature
-
Brown, A., Fox, B., Hada, S., LaMacchia, B., and Maruyama, H., SOAP security extensions: Digital signature. W3C Note, 2001.
-
(2001)
W3C Note
-
-
Brown, A.1
Fox, B.2
Hada, S.3
LaMacchia, B.4
Maruyama, H.5
-
69
-
-
0036328418
-
Unraveling the web services web: An introduction to soap,wsdl, and uddi
-
Curbera, F., Duftler, M., Khalaf, R., Nagy, W., Mukhi, N., and Weerawarana, S., Unraveling the Web services web: An introduction to SOAP,WSDL, and UDDI. Internet Comput. IEEE 6(2):86-93, 2002.
-
(2002)
Internet Comput. IEEE
, vol.6
, Issue.2
, pp. 86-93
-
-
Curbera, F.1
Duftler, M.2
Khalaf, R.3
Nagy, W.4
Mukhi, N.5
Weerawarana, S.6
-
70
-
-
4344716019
-
Authorization and privacy for semantic web services
-
Kagal, L., Finin, T., Paolucci, M., Navcen, S., Sycara, K., and Denker, G., Authorization and privacy for semantic Web services. Intell. Syst. IEEE 19(4):50-56, 2004.
-
(2004)
Intell. Syst. IEEE
, vol.19
, Issue.4
, pp. 50-56
-
-
Kagal, L.1
Finin, T.2
Paolucci, M.3
Navcen, S.4
Sycara, K.5
Denker, G.6
-
71
-
-
84892611407
-
Research based on xml/soap bacnet and internet integration technology
-
Ping, Z., Zhiyong, L., Tao, Q., and Xinxing, J., Research based on XML/SOAP BACnet and internet integration technology. in Intelligent Computing and Integrated Systems (ICISS), 2010 International Conference on. 2010.
-
(2010)
Intelligent Computing and Integrated Systems (ICISS), 2010 International Conference on.
-
-
Ping, Z.1
Zhiyong, L.2
Tao, Q.3
Xinxing, J.4
-
74
-
-
1442314613
-
Statistical testing of web applications
-
Tonella, P., and Ricca, F., Statistical testing of Web applications. J. Softw. Maint. Evol. Res. Pract. 16(1-2):103-127, 2004.
-
(2004)
J. Softw. Maint. Evol. Res. Pract.
, vol.16
, Issue.1-2
, pp. 103-127
-
-
Tonella, P.1
Ricca, F.2
-
75
-
-
84864039929
-
Utilize common criteria methodology for secure ubiquitous healthcare environment
-
Yu, Y.-C., and Hou, T.-W., Utilize common criteria methodology for secure ubiquitous healthcare environment. J. Med. Syst. 36(3):1689-1696, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1689-1696
-
-
Yu, Y.-C.1
Hou, T.-W.2
-
76
-
-
84876796310
-
U-healthcare system: State-of-The-Art review and challenges
-
Touati, F., and Tabish, R., U-Healthcare System: State-of-The-Art Review and Challenges. J. Med. Syst. 37(3):1-20, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.3
, pp. 1-20
-
-
Touati, F.1
Tabish, R.2
-
77
-
-
84867860941
-
Secure communication of medical information using mobile agents
-
Nikooghadam, M., and Zakerolhosseini, A., Secure communication of medical information using mobile agents. J. Med. Syst. 36(6): 3839-3850, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3839-3850
-
-
Nikooghadam, M.1
Zakerolhosseini, A.2
-
78
-
-
84872108027
-
A reliable rfid mutual authentication scheme for healthcare environments
-
Wu, Z.-Y., Chen, L., and Wu, J.-C., A Reliable RFID Mutual Authentication Scheme for Healthcare Environments. J. Med. Syst. 37(2):1-9, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-9
-
-
Wu, Z.-Y.1
Chen, L.2
Wu, J.-C.3
-
79
-
-
84867866667
-
A security and privacy preserving eprescription system based on smart cards
-
Hsu, C.-L., and Lu, C.-F., A Security and Privacy Preserving EPrescription System Based on Smart Cards. J. Med. Syst. 36(6): 3637-3647, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3637-3647
-
-
Hsu, C.-L.1
Lu, C.-F.2
-
80
-
-
84867867616
-
An efficient and secure dynamic id-based authentication scheme for telecare medical information systems
-
Chen, H.-M., Lo, J.-W., and Yeh, C.-K., An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems. J. Med. Syst. 36(6):3907-3915, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3907-3915
-
-
Chen, H.-M.1
Lo, J.-W.2
Yeh, C.-K.3
-
81
-
-
84867289770
-
A secure lightweight rfid binding proof protocol formedication errors and patient safety
-
Wu, S., Chen, K., and Zhu, Y., A Secure Lightweight RFID Binding Proof Protocol forMedication Errors and Patient Safety. J. Med. Syst. 36(5):2743-2749, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.5
, pp. 2743-2749
-
-
Wu, S.1
Chen, K.2
Zhu, Y.3
-
82
-
-
84874803351
-
A secure smart-card based authentication and key agreement scheme for telecare medicine information systems
-
Lee, T.-F., and Liu, C.-M., A Secure Smart-Card Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems. J. Med. Syst. 37(3):1-8, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.3
, pp. 1-8
-
-
Lee, T.-F.1
Liu, C.-M.2
-
83
-
-
84879569082
-
An authentication scheme for secure access to healthcare services
-
Khan, M., and Kumari, S., An authentication scheme for secure access to healthcare services. J. Med. Syst. 37(4):1-12, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.4
, pp. 1-12
-
-
Khan, M.1
Kumari, S.2
-
84
-
-
84892586258
-
A robust and simple security extension for the medical standard scp-ecg
-
Rubio, O.J., Alesanco, A., and García, J., A robust and simple security extension for the medical standard SCP-ECG. J. Biomed. Inf., (0).
-
J. Biomed. Inf
-
-
Rubio, O.J.1
Alesanco, A.2
García, J.3
-
85
-
-
33947676926
-
Implementing security in a distributed web-based ehcr
-
Sucurovic, S., Implementing security in a distributed web-based EHCR. Int. J. Med. Inform. 76(5):491, 2007.
-
(2007)
Int. J. Med. Inform.
, vol.76
, Issue.5
, pp. 491
-
-
Sucurovic, S.1
-
86
-
-
33745264384
-
Modelling privilege management and access control
-
Blobel, B., Nordberg, R., Davis, J. M., and Pharow, P., Modelling privilege management and access control. Int. J. Med. Inform. 75(8): 597-623, 2006.
-
(2006)
Int. J. Med. Inform.
, vol.75
, Issue.8
, pp. 597-623
-
-
Blobel, B.1
Nordberg, R.2
Davis, J.M.3
Pharow, P.4
-
87
-
-
0036016996
-
Quality assured trusted third parties for deploying secure internet-based healthcare applications
-
Lekkas, D., Gritzalis, S., and Katsikas, S., Quality assured trusted third parties for deploying secure internet-based healthcare applications. Int. J. Med. Inform. 65(2):79-96, 2002.
-
(2002)
Int. J. Med. Inform.
, vol.65
, Issue.2
, pp. 79-96
-
-
Lekkas, D.1
Gritzalis, S.2
Katsikas, S.3
-
88
-
-
0033120274
-
Security in health-care information systems-current trends
-
Smith, E., and Eloff, J., Security in health-care information systems-current trends. Int. J. Med. Inform. 54(1):39-54, 1999.
-
(1999)
Int. J. Med. Inform.
, vol.54
, Issue.1
, pp. 39-54
-
-
Smith, E.1
Eloff, J.2
-
89
-
-
0032030457
-
Adoption of security and confidentiality features in an operational community health information network: The comox valley experience-case example
-
Moehr, J., andMcDaniel, J., Adoption of security and confidentiality features in an operational community health information network: the Comox Valley experience-case example. Int. J. Med. Inform. 49(1): 81-87, 1998.
-
(1998)
Int. J. Med. Inform.
, vol.49
, Issue.1
, pp. 81-87
-
-
Moehr, J.1
McDaniel, J.2
-
90
-
-
0035188372
-
Securing interoperability between chip card based medical information systems and health networks
-
Blobel, B., Pharow, P., Spiegel, V., Engel, K., and Engelbrecht, R., Securing interoperability between chip card based medical information systems and health networks. Int. J. Med. Inform. 64(2-3):401-415, 2001.
-
(2001)
Int. J. Med. Inform.
, vol.64
, Issue.2-3
, pp. 401-415
-
-
Blobel, B.1
Pharow, P.2
Spiegel, V.3
Engel, K.4
Engelbrecht, R.5
-
91
-
-
75949120095
-
Aspect-oriented design and implementation of adaptable access control for electronic medical records
-
Chen, K., Chang, Y.-C., and Wang, D.-W., Aspect-oriented design and implementation of adaptable access control for Electronic Medical Records. Int. J. Med. Inform. 79(3):181-203, 2010.
-
(2010)
Int. J. Med. Inform.
, vol.79
, Issue.3
, pp. 181-203
-
-
Chen, K.1
Chang, Y.-C.2
Wang, D.-W.3
-
92
-
-
47049126126
-
Web-based infectious disease reporting using xml forms
-
Liu, D.,Wang, X., Pan, F., Xu, Y., Yang, P., and Rao, K.,Web-based infectious disease reporting using XML forms. Int. J. Med. Inform. 77(9):630, 2008.
-
(2008)
Int. J. Med. Inform.
, vol.77
, Issue.9
, pp. 630
-
-
Liu, D.1
Wang, X.2
Pan, F.3
Xu, Y.4
Yang, P.5
Rao, K.6
-
93
-
-
13444271662
-
Implementing health care systems using xml standards
-
Schweiger, R., Brumhard, M., Hoelzer, S., and Dudeck, J., Implementing health care systems using XML standards. Int. J. Med. Inform. 74(2-4):267-277, 2005.
-
(2005)
Int. J. Med. Inform.
, vol.74
, Issue.2-4
, pp. 267-277
-
-
Schweiger, R.1
Brumhard, M.2
Hoelzer, S.3
Dudeck, J.4
-
94
-
-
1842527000
-
Across-platformmodel for secure electronic health record communication
-
Ruotsalainen, P.,Across-platformmodel for secure Electronic Health Record communication. Int. J. Med. Inform. 73(3):291-296, 2004.
-
(2004)
Int. J. Med. Inform.
, vol.73
, Issue.3
, pp. 291-296
-
-
Ruotsalainen, P.1
-
95
-
-
1842526990
-
A security architecture for interconnecting health information systems
-
Gritzalis, D., and Lambrinoudakis, C., A security architecture for interconnecting health information systems. Int. J. Med. Inform. 73(3):305-310, 2004.
-
(2004)
Int. J. Med. Inform.
, vol.73
, Issue.3
, pp. 305-310
-
-
Gritzalis, D.1
Lambrinoudakis, C.2
-
96
-
-
0042066365
-
Xml as standard for communicating in a document-based electronic patient record: A 3 years experiment
-
Rassinoux, A.M., Lovis, C., Baud, R., and Geissbuhler, A., XML as standard for communicating in a document-based electronic patient record: a 3 years experiment. Int. J. Med. Inform. 70(2-3):109-115, 2003.
-
(2003)
Int. J. Med. Inform.
, vol.70
, Issue.2-3
, pp. 109-115
-
-
Rassinoux, A.M.1
Lovis, C.2
Baud, R.3
Geissbuhler, A.4
-
97
-
-
0035187561
-
Medical support system for continuation of care based on xml web technology
-
Stalidis, G., Prentza, A., Vlachos, I. N., Maglavera, S., and Koutsouris, D., Medical support system for continuation of care based on XML web technology. Int. J. Med. Inform. 64(2):385-400, 2001.
-
(2001)
Int. J. Med. Inform.
, vol.64
, Issue.2
, pp. 385-400
-
-
Stalidis, G.1
Prentza, A.2
Vlachos, I.N.3
Maglavera, S.4
Koutsouris, D.5
-
98
-
-
0035182323
-
Secure medical digital libraries
-
Papadakis, I., Chrissikopoulos, V., and Polemi, D., Secure medical digital libraries. Int. J. Med. Inform. 64(2-3):417-428, 2001.
-
(2001)
Int. J. Med. Inform.
, vol.64
, Issue.2-3
, pp. 417-428
-
-
Papadakis, I.1
Chrissikopoulos, V.2
Polemi, D.3
-
99
-
-
0032032049
-
Internet security: Difficulties and solutions
-
Norifusa, M., Internet security: Difficulties and solutions. Int. J. Med. Inform. 49(1):69, 1998.
-
(1998)
Int. J. Med. Inform.
, vol.49
, Issue.1
, pp. 69
-
-
Norifusa, M.1
|