-
1
-
-
84919880343
-
-
Annual Conference on Innovations in Business & Management, London:
-
Abor, P. A., and Agrizzi, D., Healthcare governance and patients’ perception of service quality. Annual Conference on Innovations in Business & Management, London, pp. 21–23, 2012.
-
(2012)
Healthcare governance and patients’ perception of service quality
, pp. 21-23
-
-
Abor, P.A.1
Agrizzi, D.2
-
2
-
-
84904342393
-
Patients’ perception of healthcare quality, satisfaction and behavioral Intention: an empirical study in Bahrain
-
Ramez, W. S., Patients’ perception of healthcare quality, satisfaction and behavioral Intention: an empirical study in Bahrain. Int. J. Bus. Soc. Sci. 3(18):131–141, 2012.
-
(2012)
Int. J. Bus. Soc. Sci.
, vol.3
, Issue.18
, pp. 131-141
-
-
Ramez, W.S.1
-
3
-
-
84904354247
-
A study of medical service quality and In-patients’ satisfaction by using Kano’s model—An example of certain district hospital in Taichung
-
Lin, C. L., Cheng, C. M., and Ma, C. H., A study of medical service quality and In-patients’ satisfaction by using Kano’s model—An example of certain district hospital in Taichung. Hsiuping J. 23:103–132, 2011.
-
(2011)
Hsiuping J.
, vol.23
, pp. 103-132
-
-
Lin, C.L.1
Cheng, C.M.2
Ma, C.H.3
-
4
-
-
84868321086
-
Security service level agreements based authentication and authorization model for accessing cloud services
-
Bajpai, D., Vardhan, M., Gupta, S., Kumar, R., and Kushwaha, D. S., Security service level agreements based authentication and authorization model for accessing cloud services. Adv. Intell. Syst. Comput. 176:719–728, 2012.
-
(2012)
Adv. Intell. Syst. Comput.
, vol.176
, pp. 719-728
-
-
Bajpai, D.1
Vardhan, M.2
Gupta, S.3
Kumar, R.4
Kushwaha, D.S.5
-
5
-
-
79960241719
-
-
International Conference on Information Science and Applications, Jeju Island:
-
Hwang, J. J., Chuang, H. K., Hsu, Y. C., and Wu, C. H., A business model for cloud computing based on a Separate encryption and decryption service. International Conference on Information Science and Applications, Jeju Island, pp. 26–29, 2011.
-
(2011)
A business model for cloud computing based on a Separate encryption and decryption service
, pp. 26-29
-
-
Hwang, J.J.1
Chuang, H.K.2
Hsu, Y.C.3
Wu, C.H.4
-
7
-
-
84863353902
-
Cloud-based identity attribute service with privacy protection in Cyberspace
-
Zou, X., Chen, B., and Jin, B., Cloud-based identity attribute service with privacy protection in Cyberspace. Procardia Eng. 29:1160–1164, 2012.
-
(2012)
Procardia Eng.
, vol.29
, pp. 1160-1164
-
-
Zou, X.1
Chen, B.2
Jin, B.3
-
8
-
-
84863590115
-
-
The 27th Annual ACM Symposium on Applied Computing, Trento:
-
Balduzzi, M., Zaddach, J., Balzarotti, D., Kirda, E., and Loureiro, S., A security analysis of amazon’s elastic compute cloud service. The 27th Annual ACM Symposium on Applied Computing, Trento, pp. 1427–1434, 2012.
-
(2012)
A security analysis of amazon’s elastic compute cloud service
, pp. 1427-1434
-
-
Balduzzi, M.1
Zaddach, J.2
Balzarotti, D.3
Kirda, E.4
Loureiro, S.5
-
9
-
-
71749111157
-
A service-oriented qos-assured and multi-agent cloud computing architecture
-
Cao, B. Q., Li, B., and Xia, Q. M., A service-oriented qos-assured and multi-agent cloud computing architecture. Cloud Comput. 5931:644–649, 2009.
-
(2009)
Cloud Comput.
, vol.5931
, pp. 644-649
-
-
Cao, B.Q.1
Li, B.2
Xia, Q.M.3
-
10
-
-
84875209774
-
Mechanisms for SLA provisioning in cloud-based service providers
-
Casalicchio, E., and Silvestri, L., Mechanisms for SLA provisioning in cloud-based service providers. Comput. Netw. 57(3):795–810, 2013.
-
(2013)
Comput. Netw.
, vol.57
, Issue.3
, pp. 795-810
-
-
Casalicchio, E.1
Silvestri, L.2
-
11
-
-
84868664144
-
Enterprise cloud service architectures
-
Wang, H., He, W., and Wang, F. K., Enterprise cloud service architectures. Inf. Technol. Manag. 13(4):445–454, 2012.
-
(2012)
Inf. Technol. Manag.
, vol.13
, Issue.4
, pp. 445-454
-
-
Wang, H.1
He, W.2
Wang, F.K.3
-
12
-
-
84904349651
-
Cloud computing security
-
Tsai, Y. L., Cloud computing security. Commun. CCISA 18(2):62–68, 2012.
-
(2012)
Commun. CCISA
, vol.18
, Issue.2
, pp. 62-68
-
-
Tsai, Y.L.1
-
13
-
-
84919908479
-
-
IHS iSuppli web site: http://www.ihs.com/products/electronics-media/isuppli.aspx
-
-
-
-
14
-
-
14844333829
-
The national healthcare quality and disparities reports: an overview
-
Kelley, E., Moy, E., Stryer, D., Burstin, H., and Clancy, C., The national healthcare quality and disparities reports: an overview. Med. Care 43:I3–8, 2005.
-
(2005)
Med. Care
, vol.43
, pp. I3-I8
-
-
Kelley, E.1
Moy, E.2
Stryer, D.3
Burstin, H.4
Clancy, C.5
-
15
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.
-
(2009)
Comput. Stand. Interfaces
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.T.2
Feng, D.G.3
-
16
-
-
84864061174
-
A secure authentication scheme for telecare medicine information systems
-
Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1529-1535
-
-
Wu, Z.Y.1
Lee, Y.C.2
Lai, F.3
Lee, H.C.4
Chung, Y.5
-
17
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.B.1
Chen, J.H.2
Zhang, R.3
-
18
-
-
84867869987
-
An improved authentication scheme for telecare medicine information systems
-
Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3597-3604
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
19
-
-
84867843422
-
An efficient authentication scheme for telecare medicine information systems
-
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3833-3838
-
-
Zhu, Z.1
-
20
-
-
84872108080
-
A privacy enhanced authentication scheme for telecare medical information systems
-
Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, pp. 9897
-
-
Jiang, Q.1
Ma, J.2
Ma, Z.3
Li, G.4
-
21
-
-
84883251252
-
-
Kumari, S., Khan, M. K., Kumar, R., Cryptanalysis and improvement of ‘A privacy enhanced scheme for telecare medical information systems’. J. Med. Syst. 37(4), Article: 9952
-
Kumari, S., Khan, M. K., Kumar, R., Cryptanalysis and improvement of ‘A privacy enhanced scheme for telecare medical information systems’. J. Med. Syst. 37(4), Article: 9952, DOI: 10.1007/s10916-013-9952-5, 2013.
-
-
-
-
22
-
-
84904272742
-
A secure medical data exchange protocol based on cloud environment
-
Chen, C. L., and Yang, T. T., A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 2014. doi:10.1007/s10916-014-0112-3.
-
(2014)
J. Med. Syst.
-
-
Chen, C.L.1
Yang, T.T.2
-
23
-
-
84893021026
-
-
Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2), Article: 13, 2014
-
Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2), Article: 13, DOI: 10.1007/s10916-014-0013-5, 2014.
-
-
-
-
24
-
-
33645788387
-
-
McCullagh, A., and Caelli, W., Non-repudiation in the digital environment. First Monday, 5(8), 2000
-
McCullagh, A., and Caelli, W., Non-repudiation in the digital environment. First Monday, 5(8), DOI: http://dx.doi.org/10.5210/fm.v5i8.778, 2000.
-
-
-
-
25
-
-
84904297373
-
Designing a healthcare authorization model based on cloud authentication
-
Chen, C. L., Yang, T. T., Leu, F. Y., and Huang, Y. L., Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft. Comput. 20(3):365–379, 2014.
-
(2014)
Intell. Autom. Soft. Comput.
, vol.20
, Issue.3
, pp. 365-379
-
-
Chen, C.L.1
Yang, T.T.2
Leu, F.Y.3
Huang, Y.L.4
-
26
-
-
84946840347
-
Short signatures from the Weil pairing
-
Boneh, D., Lynn, B., and Shacham, H., Short signatures from the Weil pairing. Adv. Cryptol. ASIACRYPT 2248:514–532, 2001.
-
(2001)
Adv. Cryptol. ASIACRYPT
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
27
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Boneh, D., and Franklin, M., Identity-based encryption from the Weil pairing. Adv. Cryptol.- Crypto 2139:213–229, 2001.
-
(2001)
Adv. Cryptol.- Crypto
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
28
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Hess, F., Efficient identity based signature schemes based on pairings. Sel. Areas Crypt 2595:310–324, 2003.
-
(2003)
Sel. Areas Crypt
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
29
-
-
0027663154
-
Elliptic curve cryptosystems and their implementation
-
Menezes, A., and Vanstone, S., Elliptic curve cryptosystems and their implementation. J. Cryptol. 6(4):209–224, 1993.
-
(1993)
J. Cryptol.
, vol.6
, Issue.4
, pp. 209-224
-
-
Menezes, A.1
Vanstone, S.2
-
30
-
-
24944443391
-
ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I). Networking 2005, LCNS 3462, University of Waterloo
-
Ertaul, L., and Lu, W., ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I). Networking 2005, LCNS 3462, University of Waterloo, Canada, pp. 102–113, May 2005.
-
(2005)
Canada
, pp. 102-113
-
-
Ertaul, L.1
Lu, W.2
-
31
-
-
84919908475
-
-
Johnson, D., and Menezes, A., The Elliptic Curve Digital Signature Algorithm (ECDSA). Tech. rep. CORR 99–34, Department of C & O, University of Waterloo, http://cacr.math.waterloo.ca, 1999.
-
-
-
-
33
-
-
84919908474
-
-
X.509 certificate - Wikipedia, http://en.wikipedia.org/wiki/X.509, access available on 10 May 2014.
-
-
-
-
34
-
-
84919908473
-
-
Ministry of Health and Welfare in Taiwan, http://www.mohw.gov.tw/EN/Ministry/Index.aspx, access available on 10 May 2014.
-
-
-
-
35
-
-
84919908472
-
-
Third generation of mobile telecommunications technology - Wikipedia, http://en.wikipedia.org/wiki/3G, access available on 10 May 2014.
-
-
-
|