Requirements for Integrating End-to-End Security into Large-Scale EHR Systems
暂无分享,去创建一个
Marcel Winandy | Agnes Gawlik | Lennart Köster | Hiva Mahmoodi | M. Winandy | L. Köster | Agnes Gawlik | Hiva Mahmoodi
[1] Waegemann Cp. The five levels of electronic health records. , 1996 .
[2] Ruth Breu,et al. A Security Infrastructure for Shared Electronic Health Records - Role Based Access Control as IHE XDS Extension towards End-to-end Security , 2007 .
[3] Wouter Joosen,et al. Hardening XDS-Based Architectures , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[4] R. Cross. The Illinois Department of Public Health. , 1955 .
[5] A. Boonstra,et al. Barriers to the acceptance of electronic medical records by physicians from systematic review to taxonomy and interventions , 2010, BMC health services research.
[6] Sebastian Garde,et al. Towards Semantic Interoperability for Electronic Health Records , 2007, Methods of Information in Medicine.
[7] Noboru Sonehara,et al. Aspects of privacy for electronic health records , 2011, Int. J. Medical Informatics.
[8] Adam Bosworth,et al. What it takes: characteristics of the ideal personal health record. , 2009, Health affairs.
[9] Neal Leavitt,et al. Internet Security under Attack: The Undermining of Digital Certificates , 2011, Computer.
[10] David W. Bates,et al. The use of health information technology in seven nations , 2008, Int. J. Medical Informatics.
[11] D. Brailer. Interoperability: the key to the future health care system. , 2005, Health affairs.
[12] Dawn Xiaodong Song,et al. On the Feasibility of Internet-Scale Author Identification , 2012, 2012 IEEE Symposium on Security and Privacy.
[13] Robert Steele,et al. Role-Based Access To Portable Personal Health Records , 2009, 2009 International Conference on Management and Service Science.
[14] Björn Bergh,et al. EHR access rights and the role of the patient , 2009 .
[15] Paul Greenfield,et al. A Decentralised Approach to Electronic Consent and Health Information Access Control , 2005, J. Res. Pract. Inf. Technol..
[16] Daniel Slamanig,et al. Privacy-enhancing methods for e-health applications: how to prevent statistical analyses and attacks , 2008, Int. J. Bus. Intell. Data Min..
[17] Ahmad-Reza Sadeghi,et al. Securing the e-health cloud , 2010, IHI.
[18] Jan Marco Leimeister,et al. Integration of Patient Health Portals into the German Healthcare Telematics Infrastructure , 2009, AMCIS.
[19] Eric C. Pan,et al. The value of health care information exchange and interoperability. , 2005, Health affairs.
[20] Reihaneh Safavi-Naini,et al. Privacy preserving EHR system using attribute-based infrastructure , 2010, CCSW '10.
[21] Kaija Saranto,et al. Definition, structure, content, use and impacts of electronic health records: A review of the research literature , 2008, Int. J. Medical Informatics.
[22] Matthew Green,et al. Securing electronic medical records using attribute-based encryption on mobile devices , 2011, SPSM '11.
[23] Marcel Winandy. A Note on the Security in the Card Management System of the German E-Health Card , 2010, eHealth.
[24] C. A. Klein,et al. Cloudy confidentiality: clinical and legal implications of cloud computing in health care. , 2011, The journal of the American Academy of Psychiatry and the Law.
[25] Thomas Neubauer,et al. Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents , 2012, 2012 45th Hawaii International Conference on System Sciences.
[26] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.