메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Audit mechanisms for privacy protection in healthcare environments

Author keywords

[No Author keywords available]

Indexed keywords

HEALTH CARE;

EID: 84930668998     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (6)
  • 2
    • 17544394392 scopus 로고    scopus 로고
    • Computer security in the real world
    • B. W. Lampson, “Computer security in the real world,” IEEE Computer, vol. 37, no. 6, pp. 37–46, 2004.
    • (2004) IEEE Computer , vol.37 , Issue.6 , pp. 37-46
    • Lampson, B. W.1
  • 4
    • 80755168369 scopus 로고    scopus 로고
    • Policy auditing over incomplete logs: Theory, implementation and applications
    • To appear
    • D. Garg, L. Jia, and A. Datta, “Policy auditing over incomplete logs: Theory, implementation and applications,” in Proc. ACM CCS, 2011, To appear.
    • (2011) Proc. ACM CCS
    • Garg, D.1    Jia, L.2    Datta, A.3
  • 5
    • 80052659402 scopus 로고    scopus 로고
    • Regret minimizing audits: A learning-theoretic basis for privacy protection
    • J. Blocki, N. Christin, A. Datta, and A. Sinha, “Regret minimizing audits: A learning-theoretic basis for privacy protection,” in Proc. IEEE CSF, 2011.
    • (2011) Proc. IEEE CSF
    • Blocki, J.1    Christin, N.2    Datta, A.3    Sinha, A.4
  • 6
    • 84926090269 scopus 로고    scopus 로고
    • Learning, regret minimization, and equilibria
    • A. Blum and Y. Mansour, “Learning, regret minimization, and equilibria,” Algorithmic Game Theory, pp. 79–102, 2007.
    • (2007) Algorithmic Game Theory , pp. 79-102
    • Blum, A.1    Mansour, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.