메뉴 건너뛰기




Volumn , Issue , 2013, Pages 1660-1665

A contactless e-health information system with privacy

Author keywords

E health; Privacy; Secret sharing

Indexed keywords

DATA MINIMIZATIONS; E-HEALTH INFRASTRUCTURES; EHEALTH; LARGE AMOUNTS; PRIVACY PRESERVING; SECRET SHARING; SECURITY AND PRIVACY; SENSITIVE DATAS;

EID: 84883734422     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWCMC.2013.6583805     Document Type: Conference Paper
Times cited : (4)

References (19)
  • 2
    • 0029697680 scopus 로고    scopus 로고
    • A security policy model for clinical information systems
    • [And02]. Cambridge, University of Cambridge Computer Laboratory, IEEE
    • [And02] R.J. Anderson. A security policy model for clinical information systems. In Security and Privacy, 1996., pages 30-43, Cambridge, 2002. University of Cambridge Computer Laboratory, IEEE.
    • (2002) Security and Privacy, 1996 , pp. 30-43
    • Anderson, R.J.1
  • 3
    • 84992990079 scopus 로고    scopus 로고
    • Under threat: Patient confidentiality and nhs computing
    • And06
    • [And06] R. Anderson. Under threat: patient confidentiality and nhs computing. Drugs and Alcohol Today, 6(4):13-17, 2006.
    • (2006) Drugs and Alcohol Today , vol.6 , Issue.4 , pp. 13-17
    • Anderson, R.1
  • 4
    • 38949162569 scopus 로고    scopus 로고
    • Patient confidentiality and central databases
    • And08
    • [And08] R. Anderson. Patient confidentiality and central databases. Br J Gen Pract, 58(547):75-76, 2008.
    • (2008) Br J Gen Pract , vol.58 , Issue.547 , pp. 75-76
    • Anderson, R.1
  • 6
    • 70249120334 scopus 로고    scopus 로고
    • Towards a cross-context identity management framework in ehealth
    • DDCP09
    • [DDCP09] M. Deng, D. De Cock, and B. Preneel. Towards a cross-context identity management framework in ehealth. Online Information Review, 33(3):422-442, 2009.
    • (2009) Online Information Review , vol.33 , Issue.3 , pp. 422-442
    • Deng, M.1    De Cock, D.2    Preneel, B.3
  • 7
    • 45849114411 scopus 로고    scopus 로고
    • A privacy-preserving ehealth protocol compliant with the belgian healthcare system
    • [DDLVK08]
    • [DDLVK08] B. De Decker, M. Layouni, H. Vangheluwe, and Verslype K. A privacy-preserving ehealth protocol compliant with the belgian healthcare system. In Public Key Infrastructure, pages 118-133, 2008.
    • (2008) Public Key Infrastructure , pp. 118-133
    • De Decker, B.1    Layouni, M.2    Vangheluwe, H.3    Verslype, K.4
  • 14
    • 33745883087 scopus 로고    scopus 로고
    • Anonymity, unlinkability, unobservability, pseudonymity, and identity management - A consolidated proposal for terminology
    • [PH08]. v0.31
    • [PH08] A. Pfitzmann and M. Hansen. Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Technical Report, 2008. v0.31.
    • (2008) Technical Report
    • Pfitzmann, A.1    Hansen, M.2
  • 16
    • 0018545449 scopus 로고
    • How to share a secret
    • Sha79
    • [Sha79] A. Shamir. How to share a secret. Communications of the ACM 22, pages 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 17
    • 79960660075 scopus 로고    scopus 로고
    • On the hardware implementation cost of crypto-processors architectures
    • Skl10
    • [Skl10] Nicolas Sklavos. On the hardware implementation cost of crypto-processors architectures. Information Security Journal: A Global Perspective, 19(2):53-60, 2010.
    • (2010) Information Security Journal: A Global Perspective , vol.19 , Issue.2 , pp. 53-60
    • Sklavos, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.