-
2
-
-
0029697680
-
A security policy model for clinical information systems
-
[And02]. Cambridge, University of Cambridge Computer Laboratory, IEEE
-
[And02] R.J. Anderson. A security policy model for clinical information systems. In Security and Privacy, 1996., pages 30-43, Cambridge, 2002. University of Cambridge Computer Laboratory, IEEE.
-
(2002)
Security and Privacy, 1996
, pp. 30-43
-
-
Anderson, R.J.1
-
3
-
-
84992990079
-
Under threat: Patient confidentiality and nhs computing
-
And06
-
[And06] R. Anderson. Under threat: patient confidentiality and nhs computing. Drugs and Alcohol Today, 6(4):13-17, 2006.
-
(2006)
Drugs and Alcohol Today
, vol.6
, Issue.4
, pp. 13-17
-
-
Anderson, R.1
-
4
-
-
38949162569
-
Patient confidentiality and central databases
-
And08
-
[And08] R. Anderson. Patient confidentiality and central databases. Br J Gen Pract, 58(547):75-76, 2008.
-
(2008)
Br J Gen Pract
, vol.58
, Issue.547
, pp. 75-76
-
-
Anderson, R.1
-
6
-
-
70249120334
-
Towards a cross-context identity management framework in ehealth
-
DDCP09
-
[DDCP09] M. Deng, D. De Cock, and B. Preneel. Towards a cross-context identity management framework in ehealth. Online Information Review, 33(3):422-442, 2009.
-
(2009)
Online Information Review
, vol.33
, Issue.3
, pp. 422-442
-
-
Deng, M.1
De Cock, D.2
Preneel, B.3
-
7
-
-
45849114411
-
A privacy-preserving ehealth protocol compliant with the belgian healthcare system
-
[DDLVK08]
-
[DDLVK08] B. De Decker, M. Layouni, H. Vangheluwe, and Verslype K. A privacy-preserving ehealth protocol compliant with the belgian healthcare system. In Public Key Infrastructure, pages 118-133, 2008.
-
(2008)
Public Key Infrastructure
, pp. 118-133
-
-
De Decker, B.1
Layouni, M.2
Vangheluwe, H.3
Verslype, K.4
-
8
-
-
67649785333
-
Identity in federated electronic healthcare
-
[DSDC+09]. IEEE
-
[DSDC+09] M. Deng, R. Scandariato, D. De Cock, B. Preneel, and W. Joosen. Identity in federated electronic healthcare. In Wireless Days, 2008. WD'08. 1st IFIP, pages 1-5. IEEE, 2009.
-
(2009)
Wireless Days, 2008. WD'08. 1st IFIP
, pp. 1-5
-
-
Deng, M.1
Scandariato, R.2
De Cock, D.3
Preneel, B.4
Joosen, W.5
-
14
-
-
33745883087
-
Anonymity, unlinkability, unobservability, pseudonymity, and identity management - A consolidated proposal for terminology
-
[PH08]. v0.31
-
[PH08] A. Pfitzmann and M. Hansen. Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Technical Report, 2008. v0.31.
-
(2008)
Technical Report
-
-
Pfitzmann, A.1
Hansen, M.2
-
15
-
-
84883684680
-
-
[QCF+09]. In IOS Press, editor, Medical Informatics in a United and Healthy Europe K.-P. Adlassnig et al. (Eds.)
-
[QCF+09] C. Quantin, G. Coatrieux, M. Fassa, V. Breton, DO Jaquet-Chiffelle, P. De Vlieger, N Lypszyc, J-Y Boire, C. Roux, and F-A Allaert. Centralised versus decentralised management of patients' medical records. In IOS Press, editor, Medical Informatics in a United and Healthy Europe K.-P. Adlassnig et al. (Eds.), 2009.
-
(2009)
Centralised Versus Decentralised Management of Patients' Medical Records
-
-
Quantin, C.1
Coatrieux, G.2
Fassa, M.3
Breton, V.4
Jaquet-Chiffelle, D.O.5
De Vlieger, P.6
Lypszyc, N.7
Boire, J.-Y.8
Roux, C.9
Allaert, F.-A.10
-
16
-
-
0018545449
-
How to share a secret
-
Sha79
-
[Sha79] A. Shamir. How to share a secret. Communications of the ACM 22, pages 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
17
-
-
79960660075
-
On the hardware implementation cost of crypto-processors architectures
-
Skl10
-
[Skl10] Nicolas Sklavos. On the hardware implementation cost of crypto-processors architectures. Information Security Journal: A Global Perspective, 19(2):53-60, 2010.
-
(2010)
Information Security Journal: A Global Perspective
, vol.19
, Issue.2
, pp. 53-60
-
-
Sklavos, N.1
|