-
1
-
-
84857253607
-
-
Retrieved March, 2006, from www.ahic.org.au/downloads/Foundations%20for%20the%20future.pdf
-
Australian Government Department of Health and Aging (DoHA) Project. (2002). Consumer consent in electronic health data exchange—e-consent. Retrieved March, 2006, from www.ahic.org.au/downloads/Foundations%20for%20the%20future.pdf
-
(2002)
Consumer consent in electronic health data exchange—e-consent
-
-
-
2
-
-
21644433634
-
Xen and the art of virtualization
-
New York
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., & Warfeld, A. (2003). Xen and the art of virtualization. 19th ACM Symposium on Operating Systems Principles, (pp. 164–177). New York:.
-
(2003)
19th ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfeld, A.9
-
5
-
-
85001797901
-
The secure electronic transfer of prescriptions
-
Chadwick, D., & Mundy, D. (2004). The secure electronic transfer of prescriptions. Healthcare Computing, 11–25.
-
(2004)
Healthcare Computing
, pp. 11-25
-
-
Chadwick, D.1
Mundy, D.2
-
6
-
-
84943605169
-
PatientService: Electronic patient record redaction and delivery in pervasive environment
-
Choudhri, A., Kagal, L., Joshi, A., Finin, T., & Yesha, Y. (2003). PatientService: Electronic patient record redaction and delivery in pervasive environment. Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003),.
-
(2003)
Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003)
-
-
Choudhri, A.1
Kagal, L.2
Joshi, A.3
Finin, T.4
Yesha, Y.5
-
7
-
-
0141733117
-
Modelling access policies using roles in requirements engineering
-
Crook, R., Ince, D., & Nuseibeh, B. (2003). Modelling access policies using roles in requirements engineering. Information and Software Technology, 45, 979–991.
-
(2003)
Information and Software Technology
, vol.45
, pp. 979-991
-
-
Crook, R.1
Ince, D.2
Nuseibeh, B.3
-
8
-
-
14544298547
-
A case study in access control requirements for a health information system
-
Evered, M., & Bogeholz, S. (2004). A case study in access control requirements for a health information system. Australasian Information Security Workshop, 53–61.
-
(2004)
Australasian Information Security Workshop
, pp. 53-61
-
-
Evered, M.1
Bogeholz, S.2
-
9
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
Bolton Landing, NY
-
Garfnkel, T., Pfaff, B., Chow, J., Rosenblum, M., & Boneh, D. (2003). Terra: A virtual machine-based platform for trusted computing. 19th ACM Symposium on Operating Systems Principles (pp. 193–206). Bolton Landing, NY.
-
(2003)
19th ACM Symposium on Operating Systems Principles
, pp. 193-206
-
-
Garfnkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
10
-
-
29244460063
-
Symmetric behavior-based trust: A new paradigm for Internet computing
-
Haldar V., & Franz, M. (2004). Symmetric behavior-based trust: A new paradigm for Internet computing. New Security Paradigms Workshop, 79–84.
-
(2004)
New Security Paradigms Workshop
, pp. 79-84
-
-
Haldar, V.1
Franz, M.2
-
11
-
-
0042834000
-
Security issues for implementation of e-medical records
-
Huston, T. (2001). Security issues for implementation of e-medical records. Communication of the ACM, 44(9) 89–94.
-
(2001)
Communication of the ACM
, vol.44
, Issue.9
, pp. 89-94
-
-
Huston, T.1
-
12
-
-
85001727020
-
-
Retrieved from http://trousers.sourceforge.net/
-
IBM. Trousers. (2005). A TSS implementation for Linux. Retrieved from http://trousers.sourceforge.net/
-
(2005)
A TSS implementation for Linux
-
-
-
15
-
-
0142151165
-
A contextual role-based access control authorization model for electronic patient record
-
Motta, G. H. M. B., & Furuie, S. S. (2003). A contextual role-based access control authorization model for electronic patient record. IEEE Transactions on Information Technology in Biomedicine,7 3), 202–207.
-
(2003)
IEEE Transactions on Information Technology in Biomedicine
, vol.7
, Issue.3
, pp. 202-207
-
-
Motta, G.H.M.B.1
Furuie, S.S.2
-
16
-
-
33845390986
-
A tag-based data model for privacy-preserving medical applications
-
Munich, Germany
-
Nepal, S., Zic, J., Jaccard, F., & Krahenbuehl, G. (2006a). A tag-based data model for privacy-preserving medical applications. Proceedings of EDBT IIHA Workshop (pp. 77–88). Munich, Germany.
-
(2006)
Proceedings of EDBT IIHA Workshop
, pp. 77-88
-
-
Nepal, S.1
Zic, J.2
Jaccard, F.3
Krahenbuehl, G.4
-
17
-
-
38349016107
-
Secure sharing of electronic patient records
-
Fribourg, Switzerland
-
Nepal, S., Zic, J., Krahenbuehl, G., & Jaccard, F. (2006b). Secure sharing of electronic patient records. Proceedings of 1st European Conference on eHealth. Fribourg, Switzerland.
-
(2006)
Proceedings of 1st European Conference on eHealth
-
-
Nepal, S.1
Zic, J.2
Krahenbuehl, G.3
Jaccard, F.4
-
18
-
-
84887662663
-
-
OMA-DRM-ARCH-V2_0_6–20040820-C.zip Version 2.0.6. Retrieved from http://www.openmo-bilealliance.org
-
Open Mobile Alliance (OMA), DRM Architecture, Version 2.0.6. (2004). OMA-DRM-ARCH-V2_0_6–20040820-C.zip. Retrieved from http://www.openmo-bilealliance.org
-
(2004)
DRM Architecture
-
-
-
19
-
-
2442512413
-
-
Retrieved from http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf
-
OASIS. (2005). eXtensible access control markup language (XACML) version 2.0 3. Retrieved from http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf
-
(2005)
eXtensible access control markup language (XACML) version 2.0 3
-
-
-
20
-
-
18344374896
-
A decentralised approach to electronic consent and health information access control
-
O'Keefe, C. M., Greenfeld, P., & Goodchild, A. (2005). A decentralised approach to electronic consent and health information access control. Journal of Research and Practice in Information Technology,37 2), 161–178.
-
(2005)
Journal of Research and Practice in Information Technology
, vol.37
, Issue.2
, pp. 161-178
-
-
O'Keefe, C.M.1
Greenfeld, P.2
Goodchild, A.3
-
21
-
-
24944578141
-
-
(IBM Tech. Rep.).
-
Paul, A., Satoshi, H., Karjoth, G., Powers, C., & Schunter, M. (2003). Enterprise privacy authorization language (EPAL 1.1) (IBM Tech. Rep.).
-
(2003)
Enterprise privacy authorization language (EPAL 1.1)
-
-
Paul, A.1
Satoshi, H.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
22
-
-
63449110864
-
A novel use of RBAC to protect privacy in distributed health care information systems
-
R. Safavi-Naini & J. Seberry Wollongong
-
Reid, J., Cheong, I., Henricksen, M., & Smith, J. (2003a). A novel use of RBAC to protect privacy in distributed health care information systems. In R. Safavi-Naini & J. Seberry (Eds.), Proceedings 8th Australasian Conference on Information Security and Privacy (ACISP 2003) (pp. 403–415). Wollongong.
-
(2003)
Proceedings 8th Australasian Conference on Information Security and Privacy (ACISP 2003)
, pp. 403-415
-
-
Reid, J.1
Cheong, I.2
Henricksen, M.3
Smith, J.4
-
23
-
-
84942771624
-
Privacy and trusted computing
-
Reid, J., Juan, M., Nieto, G., Dawson, E., & Okamoto, E. (2003b). Privacy and trusted computing. 14th International Workshop on Database and Expert Systems Applications (DEXA'03) (pp. 383).
-
(2003)
14th International Workshop on Database and Expert Systems Applications (DEXA'03)
, pp. 383
-
-
Reid, J.1
Juan, M.2
Nieto, G.3
Dawson, E.4
Okamoto, E.5
-
24
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
Sadeghi, A., & Stüble, C. (2004). Property-based attestation for computing platforms: Caring about properties, not mechanisms. Proceedings of the 2004 Workshop on New Security Paradigms. (pp. 67–77).
-
(2004)
Proceedings of the 2004 Workshop on New Security Paradigms
, pp. 67-77
-
-
Sadeghi, A.1
Stüble, C.2
-
25
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
Nova Scotia, Canada Washington, DC
-
Nova Scotia, Canada: Sailer, R., Jaeger, T., Zhang, X., & Doorn, L. (2004a). Attestation-based policy enforcement for remote access. In Proceedings of the 11th ACM Conference on Computer and Communication Security (pp. 308–317). Washington, DC.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communication Security
, pp. 308-317
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
Doorn, L.4
-
26
-
-
85084162270
-
Design and implementations of a TCG-based intergrity measurement architecture
-
San Diego, CA
-
Sailer R., Jaeger T., Zhang X. & Doorn L. (2004a) Design and implementations of a TCG-based intergrity measurement architecture. 13th usenix Security Symposium, pp. 223–238, San Diego, CA.
-
(2004)
13th usenix Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
Doorn, L.4
-
27
-
-
27244434460
-
Design and implementation of a TCG-based integrity measurement architecture
-
San Diego, CA
-
Sailer, R., Jaeger, T., Zhang, X., & Doorn, L. (2004b). Design and implementation of a TCG-based integrity measurement architecture. 13th Usenix Security Symposium (pp. 223–238). San Diego, CA.
-
(2004)
13th Usenix Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
Doorn, L.4
-
29
-
-
27544477855
-
BIND: A fine-grained attestation service for secure distributed systems
-
Shi, E., Perrig, A., & Van, D. L. (2005). BIND: A fine-grained attestation service for secure distributed systems. IEEE Symposium on Security and Privacy (pp. 154- 168).
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
Van, D.L.3
-
30
-
-
21644484612
-
The electronic medical record: Promises and threats
-
Stein, L. D. (1997). The electronic medical record: Promises and threats. Web Journal, 2(3).
-
(1997)
Web Journal
, vol.2
, Issue.3
-
-
Stein, L.D.1
-
31
-
-
0029860072
-
Safeguard needed in transfer of patient data
-
Task Force on Medical Informatics (TFMI). (1996). Safeguard needed in transfer of patient data. PEDIATRICS,98 5), 984–986.
-
(1996)
PEDIATRICS
, vol.98
, Issue.5
, pp. 984-986
-
-
-
33
-
-
84873472932
-
Privacy implications of remote attestation in trusted computing
-
Yung, M. (2005). Privacy implications of remote attestation in trusted computing (CSIRO ICT Centre Tech. Rep. 05/146).
-
(2005)
CSIRO ICT Centre Tech. Rep. 05/146
-
-
Yung, M.1
|