메뉴 건너뛰기




Volumn 2, Issue 1, 2007, Pages 14-35

A Trusted System for Sharing Patient Electronic Medical Records in Autonomous Distributed Health Care Systems

Author keywords

data model; electronic medical records; mutual attestation; transfer protocols; trusted computing; trusted systems

Indexed keywords


EID: 85001816326     PISSN: 15553396     EISSN: 1555340X     Source Type: Journal    
DOI: 10.4018/jhisi.2007010102     Document Type: Article
Times cited : (9)

References (33)
  • 1
    • 84857253607 scopus 로고    scopus 로고
    • Retrieved March, 2006, from www.ahic.org.au/downloads/Foundations%20for%20the%20future.pdf
    • Australian Government Department of Health and Aging (DoHA) Project. (2002). Consumer consent in electronic health data exchange—e-consent. Retrieved March, 2006, from www.ahic.org.au/downloads/Foundations%20for%20the%20future.pdf
    • (2002) Consumer consent in electronic health data exchange—e-consent
  • 5
    • 85001797901 scopus 로고    scopus 로고
    • The secure electronic transfer of prescriptions
    • Chadwick, D., & Mundy, D. (2004). The secure electronic transfer of prescriptions. Healthcare Computing, 11–25.
    • (2004) Healthcare Computing , pp. 11-25
    • Chadwick, D.1    Mundy, D.2
  • 7
    • 0141733117 scopus 로고    scopus 로고
    • Modelling access policies using roles in requirements engineering
    • Crook, R., Ince, D., & Nuseibeh, B. (2003). Modelling access policies using roles in requirements engineering. Information and Software Technology, 45, 979–991.
    • (2003) Information and Software Technology , vol.45 , pp. 979-991
    • Crook, R.1    Ince, D.2    Nuseibeh, B.3
  • 8
    • 14544298547 scopus 로고    scopus 로고
    • A case study in access control requirements for a health information system
    • Evered, M., & Bogeholz, S. (2004). A case study in access control requirements for a health information system. Australasian Information Security Workshop, 53–61.
    • (2004) Australasian Information Security Workshop , pp. 53-61
    • Evered, M.1    Bogeholz, S.2
  • 10
    • 29244460063 scopus 로고    scopus 로고
    • Symmetric behavior-based trust: A new paradigm for Internet computing
    • Haldar V., & Franz, M. (2004). Symmetric behavior-based trust: A new paradigm for Internet computing. New Security Paradigms Workshop, 79–84.
    • (2004) New Security Paradigms Workshop , pp. 79-84
    • Haldar, V.1    Franz, M.2
  • 11
    • 0042834000 scopus 로고    scopus 로고
    • Security issues for implementation of e-medical records
    • Huston, T. (2001). Security issues for implementation of e-medical records. Communication of the ACM, 44(9) 89–94.
    • (2001) Communication of the ACM , vol.44 , Issue.9 , pp. 89-94
    • Huston, T.1
  • 12
    • 85001727020 scopus 로고    scopus 로고
    • Retrieved from http://trousers.sourceforge.net/
    • IBM. Trousers. (2005). A TSS implementation for Linux. Retrieved from http://trousers.sourceforge.net/
    • (2005) A TSS implementation for Linux
  • 15
    • 0142151165 scopus 로고    scopus 로고
    • A contextual role-based access control authorization model for electronic patient record
    • Motta, G. H. M. B., & Furuie, S. S. (2003). A contextual role-based access control authorization model for electronic patient record. IEEE Transactions on Information Technology in Biomedicine,7 3), 202–207.
    • (2003) IEEE Transactions on Information Technology in Biomedicine , vol.7 , Issue.3 , pp. 202-207
    • Motta, G.H.M.B.1    Furuie, S.S.2
  • 16
    • 33845390986 scopus 로고    scopus 로고
    • A tag-based data model for privacy-preserving medical applications
    • Munich, Germany
    • Nepal, S., Zic, J., Jaccard, F., & Krahenbuehl, G. (2006a). A tag-based data model for privacy-preserving medical applications. Proceedings of EDBT IIHA Workshop (pp. 77–88). Munich, Germany.
    • (2006) Proceedings of EDBT IIHA Workshop , pp. 77-88
    • Nepal, S.1    Zic, J.2    Jaccard, F.3    Krahenbuehl, G.4
  • 18
    • 84887662663 scopus 로고    scopus 로고
    • OMA-DRM-ARCH-V2_0_6–20040820-C.zip Version 2.0.6. Retrieved from http://www.openmo-bilealliance.org
    • Open Mobile Alliance (OMA), DRM Architecture, Version 2.0.6. (2004). OMA-DRM-ARCH-V2_0_6–20040820-C.zip. Retrieved from http://www.openmo-bilealliance.org
    • (2004) DRM Architecture
  • 19
    • 2442512413 scopus 로고    scopus 로고
    • Retrieved from http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf
    • OASIS. (2005). eXtensible access control markup language (XACML) version 2.0 3. Retrieved from http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf
    • (2005) eXtensible access control markup language (XACML) version 2.0 3
  • 24
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • Sadeghi, A., & Stüble, C. (2004). Property-based attestation for computing platforms: Caring about properties, not mechanisms. Proceedings of the 2004 Workshop on New Security Paradigms. (pp. 67–77).
    • (2004) Proceedings of the 2004 Workshop on New Security Paradigms , pp. 67-77
    • Sadeghi, A.1    Stüble, C.2
  • 26
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementations of a TCG-based intergrity measurement architecture
    • San Diego, CA
    • Sailer R., Jaeger T., Zhang X. & Doorn L. (2004a) Design and implementations of a TCG-based intergrity measurement architecture. 13th usenix Security Symposium, pp. 223–238, San Diego, CA.
    • (2004) 13th usenix Security Symposium , pp. 223-238
    • Sailer, R.1    Jaeger, T.2    Zhang, X.3    Doorn, L.4
  • 27
    • 27244434460 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • San Diego, CA
    • Sailer, R., Jaeger, T., Zhang, X., & Doorn, L. (2004b). Design and implementation of a TCG-based integrity measurement architecture. 13th Usenix Security Symposium (pp. 223–238). San Diego, CA.
    • (2004) 13th Usenix Security Symposium , pp. 223-238
    • Sailer, R.1    Jaeger, T.2    Zhang, X.3    Doorn, L.4
  • 29
    • 27544477855 scopus 로고    scopus 로고
    • BIND: A fine-grained attestation service for secure distributed systems
    • Shi, E., Perrig, A., & Van, D. L. (2005). BIND: A fine-grained attestation service for secure distributed systems. IEEE Symposium on Security and Privacy (pp. 154- 168).
    • (2005) IEEE Symposium on Security and Privacy , pp. 154-168
    • Shi, E.1    Perrig, A.2    Van, D.L.3
  • 30
    • 21644484612 scopus 로고    scopus 로고
    • The electronic medical record: Promises and threats
    • Stein, L. D. (1997). The electronic medical record: Promises and threats. Web Journal, 2(3).
    • (1997) Web Journal , vol.2 , Issue.3
    • Stein, L.D.1
  • 31
    • 0029860072 scopus 로고    scopus 로고
    • Safeguard needed in transfer of patient data
    • Task Force on Medical Informatics (TFMI). (1996). Safeguard needed in transfer of patient data. PEDIATRICS,98 5), 984–986.
    • (1996) PEDIATRICS , vol.98 , Issue.5 , pp. 984-986
  • 33
    • 84873472932 scopus 로고    scopus 로고
    • Privacy implications of remote attestation in trusted computing
    • Yung, M. (2005). Privacy implications of remote attestation in trusted computing (CSIRO ICT Centre Tech. Rep. 05/146).
    • (2005) CSIRO ICT Centre Tech. Rep. 05/146
    • Yung, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.