-
1
-
-
78650131963
-
Risk assessment is fuzzy business-fuzzy logic provides the way to assess off-site risk from industrial installations
-
N. D. Mahant, "Risk Assessment is Fuzzy Business-Fuzzy Logic Provides the Way to Assess Off-site Risk from Industrial Installations", Risk 2004, No. 206.
-
(2004)
Risk
, Issue.206
-
-
Mahant, N.D.1
-
2
-
-
0033904306
-
Cognitive fuzzy modeling for enhanced risk assessment in health care institution
-
March/ April
-
E. Smith and J. Eloff, "Cognitive Fuzzy Modeling for Enhanced Risk Assessment in Health Care Institution", IEEE Intelligent Systems and Their Applications. March/ April 2000, pp.69-75.
-
(2000)
IEEE Intelligent Systems and Their Applications
, pp. 69-75
-
-
Smith, E.1
Eloff, J.2
-
4
-
-
84870401072
-
Using risk in access control for cloud-assisted ehealth
-
Liverpool, UK, June
-
M. Sharma, Y. Bai, S. Chung, and L. Dai, "Using Risk in Access Control for Cloud-Assisted eHealth", In Proceedings of the 2012 IEEE 14th International Conference on High Performance Computing and Communications (HPCC 2012), Liverpool, UK, June 2012, pp.1047-1052.
-
(2012)
Proceedings of the 2012 IEEE 14th International Conference on High Performance Computing and Communications (HPCC 2012)
, pp. 1047-1052
-
-
Sharma, M.1
Bai, Y.2
Chung, S.3
Dai, L.4
-
5
-
-
78651293524
-
Feasibility of an ehealth service to support collaborative depression care: Results of a pilot study
-
M. Meglic and et.al, "Feasibility of an eHealth Service to Support Collaborative Depression Care: Results of a Pilot Study", Journal of Medical Internet Research, Dec. 2010; 12(5):e63.
-
(2010)
Journal of Medical Internet Research, Dec.
, vol.12
, Issue.5
-
-
Meglic, M.1
-
6
-
-
79952408990
-
Fine-grained data access control systems with user accountability in cloud computing
-
Indianapolis, IN, Nov/Dec
-
J. Lin and et.al., "Fine-grained Data Access Control Systems with User Accountability in Cloud Computing", in Proceedings of 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), Indianapolis, IN, Nov/Dec 2010, pp. 89-96.
-
(2010)
Proceedings of 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom)
, pp. 89-96
-
-
Lin, J.1
-
7
-
-
84863709647
-
Design and implementation of a healthcare social cloud system
-
May, Ottawa, Canada
-
R. Wooten, R. Klink, F. Sinek, Y. Bai, and M. Sharma, "Design and Implementation of a Healthcare Social Cloud System", In Proceedings of the 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2012), May 2012, Ottawa, Canada, pp.805-810.
-
(2012)
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2012)
, pp. 805-810
-
-
Wooten, R.1
Klink, R.2
Sinek, F.3
Bai, Y.4
Sharma, M.5
-
8
-
-
34447565099
-
Application of a fuzzy based decision making methodology to construction project risk assessment
-
Zeng, J., M. An, and N. J. Smith., "Application of a Fuzzy Based Decision Making Methodology to Construction Project Risk Assessment", International Journal of Project Management 25 (6): 589-600, 2007.
-
(2007)
International Journal of Project Management
, vol.25
, Issue.6
, pp. 589-600
-
-
Zeng, J.1
An, M.2
Smith, N.J.3
-
9
-
-
84857178198
-
Espac: Enabling security and patient-centric access control for ehealth in cloud computing
-
M. Barua, X.Liang, R. Lu, and X.Shen, "ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing", International Journal of Security and Networks, 6 (2), pp. 67-76 (2011).
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2
, pp. 67-76
-
-
Barua, M.1
Liang, X.2
Lu, R.3
Shen, X.4
-
10
-
-
34547371707
-
Enforcing access control using risk assessment
-
Toulouse, France, February
-
N. N. Diep, L. X. Hung, Y. Zhung, S. Lee, Y.-K. Lee, and H. Lee, "Enforcing Access Control Using Risk Assessment," in Proceedings of the Fourth European Conference on Universal Multiservice Networks, Toulouse, France, February 2007, pp. 419-424.
-
(2007)
Proceedings of the Fourth European Conference on Universal Multiservice Networks
, pp. 419-424
-
-
Diep, N.N.1
Hung, L.X.2
Zhung, Y.3
Lee, S.4
Lee, Y.-K.5
Lee, H.6
-
11
-
-
85016097744
-
E-health cloud: Opportunities and challenges
-
N. Mohamed, E. AbuKhousa, J. Al-Jaroodi, "e-Health Cloud: Opportunities and Challenges", Future Internet, Vol. 4(3), 2011, pp.621-645.
-
(2011)
Future Internet
, vol.4
, Issue.3
, pp. 621-645
-
-
Mohamed, N.1
Abukhousa, E.2
Al-Jaroodi, J.3
-
12
-
-
79955991024
-
Quantified risk-adaptive access control for patient privacy protection in health information systems
-
Hong Kong, China, Mar.
-
Q. Wang and H. Jin "Quantified Risk-Adaptive Access Control for Patient Privacy Protection in Health Information Systems", the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China, Mar. 2011.
-
(2011)
The 6th ACM Symposium on Information, Computer and Communications Security
-
-
Wang, Q.1
Jin, H.2
-
13
-
-
38049130090
-
Classification with degree of membership: A fuzzy approach
-
San Jose, CA
-
W.-H. Au and K.C.C. Chan, Classification with Degree of Membership: A Fuzzy Approach, in: Proc. of the 1stIEEE Int'l Conf. on Data Mining, San Jose, CA, 2001, pp. 35-42.
-
(2001)
Proc. of the 1stIEEE Int'l Conf. on Data Mining
, pp. 35-42
-
-
Au, W.-H.1
Chan, K.C.C.2
-
15
-
-
84893457088
-
-
Health Level Seven International: http://www.hl7.org/
-
-
-
-
16
-
-
78650938541
-
Securing the e-healthcloud
-
ser. IHI '10
-
H. Lohr, A.-R. Sadeghi, and M. Winandy, "Securing the e-healthcloud," in Proceedings of the 1st ACM International Health Informatics Symposium, ser. IHI '10, 2010, pp. 220-229.
-
(2010)
Proceedings of the 1st ACM International Health Informatics Symposium
, pp. 220-229
-
-
Lohr, H.1
Sadeghi, A.-R.2
Winandy, M.3
-
17
-
-
74049110390
-
Patient controlled encryption: Ensuring privacy of electronic medical records
-
J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, "Patient controlled encryption: ensuring privacy of electronic medical records," in CCSW '09, 2009, pp. 103-114.
-
(2009)
CCSW '09
, pp. 103-114
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
19
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in CCS '06, 2006, pp. 89-98.
-
(2006)
CCS '06
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
21
-
-
84870706931
-
Scalable and secure sharing of personal health records in cloud computing using attributebased encryption
-
Li M., Logan Yu S., Zheng Y., Ren K., and Lou W. Scalable and secure sharing of personal health records in cloud computing using attributebased encryption. Parallel and Distributed Systems, 2012, Issue: 99:1.
-
(2012)
Parallel and Distributed Systems
, Issue.99
, pp. 1
-
-
Li, M.1
Logan Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
23
-
-
84857178198
-
Espac: Enabling security and patientcentric access control for ehealth in cloud computing
-
November 2011
-
Mrinmoy Barua, Xiaohui Liang, Rongxing Lu, and Xuemin Shen. 2011. ESPAC: Enabling Security and Patientcentric Access Control for eHealth in cloud computing. Int. J. Secur. Netw. 6, 2/3 (November 2011), 67-76.
-
(2011)
Int. J. Secur. Netw.
, vol.6
, Issue.2-3
, pp. 67-76
-
-
Barua, M.1
Liang, X.2
Lu, R.3
Shen, X.4
-
25
-
-
80455140352
-
An attribute based framework for risk-adaptive access control models
-
Vienna, Austria, Aug.
-
S. Kandala, R. Sandhu, and V. Bhamidipati, "An Attribute Based Framework for Risk-Adaptive Access Control Models", the 6th International Conference on Availability, Reliability and Security, Vienna, Austria, Aug. 2011.
-
(2011)
The 6th International Conference on Availability, Reliability and Security
-
-
Kandala, S.1
Sandhu, R.2
Bhamidipati, V.3
-
27
-
-
80052305179
-
A risk-based evaluation of group access control approaches in a healthcare setting
-
Vienna, Austria, Aug.
-
M. B. Line, I. A. Tøndel, and E. A. Gjære,"A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting", the 6th International Conference on Availability, Reliability and Security, Vienna, Austria, Aug. 2011.
-
(2011)
The 6th International Conference on Availability, Reliability and Security
-
-
Line, M.B.1
Tøndel, I.A.2
Gjære, E.A.3
-
28
-
-
84861100364
-
Dynamic risk-based decision methods for access control systems
-
R. A. Shaikh, K. Adi, and L Logrippo,"Dynamic Risk-based Decision Methods for Access Control Systems", Computers & Security, vol. 31, Nr. 4 (2012), pp. 447-464.
-
(2012)
Computers & Security
, vol.31
, Issue.4
, pp. 447-464
-
-
Shaikh, R.A.1
Adi, K.2
Logrippo, L.3
-
29
-
-
79955991024
-
Quantified risk-adaptive access control for patient privacy protection in health information systems
-
Hong Kong, China, Mar.
-
Q. Wang and H. Jin "Quantified Risk-Adaptive Access Control for Patient Privacy Protection in Health Information Systems", the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China, Mar. 2011.
-
(2011)
The 6th ACM Symposium on Information, Computer and Communications Security
-
-
Wang, Q.1
Jin, H.2
-
30
-
-
84893496823
-
Issues and challenges in securing ehealth systems
-
Forthcoming
-
Y. Bai, L. Dai, and J. Li, "Issues and Challenges in Securing eHealth Systems", International Journal of E-Health and Medical Communications,IGIGlobal.(Forthcoming) 23
-
International Journal of E-Health and Medical Communications,IGIGlobal
, pp. 23
-
-
Bai, Y.1
Dai, L.2
Li, J.3
|