The CO.R.E. Project. An Integrated Security Approach to Self-Monitoring and Medical Record Keeping
暂无分享,去创建一个
Anna Paidi | Stavros Pitoglou | Athanasios Anastasiou | Dimitrios Koutsouris | Vangelis Kostalas | Stavros Pitoglou | Athanasios Anastasiou | D. Koutsouris | A. Paidi | Vangelis Kostalas
[1] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[2] Kamran Sartipi,et al. HL7 FHIR: An Agile and RESTful approach to healthcare information exchange , 2013, Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems.
[3] Ramaswamy Chandramouli,et al. Cryptographic Key Management Issues and Challenges in Cloud Services , 2014, Secure Cloud Computing.
[4] Liam Peyton,et al. Systematic Literature Review on the Anonymization of High Dimensional Streaming Datasets for Health Data Sharing , 2015, EUSPN/ICTH.
[5] Frank Stajano,et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.
[6] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[7] Mansoor Ebrahim,et al. Symmetric Algorithm Survey: A Comparative Analysis , 2013, ArXiv.
[8] Jeffrey F. Naughton,et al. Anonymization of Set-Valued Data via Top-Down, Local Generalization , 2009, Proc. VLDB Endow..
[9] R. Righi,et al. Personal Health Records: A Systematic Literature Review , 2017, Journal of medical Internet research.
[10] Korra Sathya Babu,et al. Evaluation of generalization based K-anonymization algorithms , 2017, 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS).
[11] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.