-
2
-
-
85092050920
-
-
Direct Project
-
Direct Project. http://wiki.directproject.org/.
-
-
-
-
3
-
-
74549207114
-
-
Health Information Privacy. http://www.hhs.gov/ocr/privacy/hipaa/administrative/ breachnotificationrule/breachtool. html.
-
Health Information Privacy
-
-
-
4
-
-
84876868946
-
-
Medical Identity Theft. http://www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt10. shtm.
-
Medical Identity Theft
-
-
-
6
-
-
85092058362
-
-
Kaiser Permanente Laptop Stolen. http://www.consumeraffairs.com/news04/2006/ 11/kaiser_laptop.html, 2006.
-
(2006)
Kaiser Permanente Laptop Stolen
-
-
-
7
-
-
85092020917
-
-
Patients’ Data on Stolen Laptop. http://www.washingtonpost.com/wp-dyn/content/ article/2008/03/23/AR2008032301753. html, 2008.
-
(2008)
Patients’ Data on Stolen Laptop
-
-
-
8
-
-
84875634380
-
Provenance-based auditing of private data use
-
R. Aldeco-Pérez and L. Moreau. Provenance-based auditing of private data use. In BCS Int. Acad. Conf., pages 141–152, 2008.
-
(2008)
BCS Int. Acad. Conf
, pp. 141-152
-
-
Aldeco-Pérez, R.1
Moreau, L.2
-
9
-
-
28444478342
-
Privacy and ownership preserving of outsourced medical data
-
E. Bertino, B. C. Ooi, Y. Yang, and R. H. Deng. Privacy and ownership preserving of outsourced medical data. In ICDE, pages 521–532, 2005.
-
(2005)
ICDE
, pp. 521-532
-
-
Bertino, E.1
Ooi, B. C.2
Yang, Y.3
Deng, R. H.4
-
10
-
-
70350418277
-
Data hemorrhages in the health-care sector
-
M. E. Johnson. Data hemorrhages in the health-care sector. In Financial Cryptography, pages 71–89, 2009.
-
(2009)
Financial Cryptography
, pp. 71-89
-
-
Johnson, M. E.1
-
11
-
-
85015513011
-
Privacy issues of provenance in electronic healthcare record systems
-
T. Kifor, L. Varga, S. Álvarez, J. Vázquez-Salceda, and S. Willmott. Privacy issues of provenance in electronic healthcare record systems. Journal of Autonomic and Trusted Computing (JoATC), 2008.
-
(2008)
Journal of Autonomic and Trusted Computing (JoATC)
-
-
Kifor, T.1
Varga, L.2
Álvarez, S.3
Vázquez-Salceda, J.4
Willmott, S.5
-
12
-
-
84863420371
-
Modifying without a trace: General audit guidelines are inadequate for electronic health record audit mechanisms
-
J. King, B. Smith, and L. Williams. Modifying without a trace: General audit guidelines are inadequate for electronic health record audit mechanisms. In Proceedings of ACM IHI 2012, 2012.
-
(2012)
Proceedings of ACM IHI 2012
-
-
King, J.1
Smith, B.2
Williams, L.3
-
15
-
-
42149109673
-
The provenance of electronic data
-
L. Moreau, P. T. Groth, S. Miles, J. Vázquez-Salceda, J. Ibbotson, S. Jiang, S. Munroe, O. F. Rana, A. Schreiber, V. Tan, and L. Z. Varga. The provenance of electronic data. Commun. ACM, 51(4):52–58, 2008.
-
(2008)
Commun. ACM
, vol.51
, Issue.4
, pp. 52-58
-
-
Moreau, L.1
Groth, P. T.2
Miles, S.3
Vázquez-Salceda, J.4
Ibbotson, J.5
Jiang, S.6
Munroe, S.7
Rana, O. F.8
Schreiber, A.9
Tan, V.10
Varga, L. Z.11
-
16
-
-
0345058957
-
Universal designated-verifier signatures
-
R. Steinfeld, L. Bull, H. Wang, and J. Pieprzyk. Universal designated-verifier signatures. Advances in Cryptology-Asiacrypt 2003, pages 523–542, 2003.
-
(2003)
Advances in Cryptology-Asiacrypt 2003
, pp. 523-542
-
-
Steinfeld, R.1
Bull, L.2
Wang, H.3
Pieprzyk, J.4
-
17
-
-
45449105171
-
Information accountability
-
D. J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigenbaum, J. A. Hendler, and G. J. Sussman. Information accountability. Commun. ACM, 51(6):82–87, 2008.
-
(2008)
Commun. ACM
, vol.51
, Issue.6
, pp. 82-87
-
-
Weitzner, D. J.1
Abelson, H.2
Berners-Lee, T.3
Feigenbaum, J.4
Hendler, J. A.5
Sussman, G. J.6
|