Threats to patients’ privacy in smart healthcare environment
暂无分享,去创建一个
[1] Josep Domingo-Ferrer,et al. FRR: Fair remote retrieval of outsourced private medical records in electronic health networks , 2014, J. Biomed. Informatics.
[2] Kevin Ashton,et al. That ‘Internet of Things’ Thing , 1999 .
[3] Giuseppe Piro,et al. Information centric services in Smart Cities , 2014, J. Syst. Softw..
[4] Chia-Hung Hsiao,et al. Privacy preservation and information security protection for patients' portable electronic health records , 2009, Comput. Biol. Medicine.
[5] Muhammad Waseem,et al. A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .
[6] Alptekin Küpçü,et al. Research issues for privacy and security of electronic health services , 2017, Future Gener. Comput. Syst..
[7] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[8] Noboru Sonehara,et al. Aspects of privacy for electronic health records , 2011, Int. J. Medical Informatics.
[9] Danah Boyd,et al. Facebook privacy settings: Who cares? , 2010, First Monday.
[10] Kun Liu,et al. Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework , 2007, PKDD.
[11] Adil Rajput,et al. Natural Language Processing, Sentiment Analysis and Clinical Analytics , 2019, Innovation in Health Informatics.
[12] Aristides Lopes da Silva,et al. Health and emergency-care platform for the elderly and disabled people in the Smart City , 2015, J. Syst. Softw..
[13] James A. Hendler,et al. Embracing "Web 3.0" , 2007, IEEE Internet Computing.
[14] José Luis Fernández Alemán,et al. Security and privacy in electronic health records: A systematic literature review , 2013, J. Biomed. Informatics.
[15] Michele Nogueira Lima,et al. Interoperability issues on heterogeneous wireless communication for smart cities , 2015, Comput. Commun..
[16] G. Loewenstein,et al. Privacy and human behavior in the age of information , 2015, Science.
[17] Batami Sadan. Patient data confidentiality and patient rights , 2001, Int. J. Medical Informatics.
[18] Steven Furnell,et al. Assessing the security perceptions of personal Internet users , 2007, Comput. Secur..
[19] Milan Petkovic,et al. Secure management of personal health records by applying attribute-based encryption , 2009, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health.
[20] Patricia A. H. Williams,et al. Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem , 2015, Medical devices.
[21] Yuguang Fang,et al. A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks , 2014, IEEE Transactions on Mobile Computing.
[22] Klaus Wehrle,et al. Privacy in the Internet of Things: threats and challenges , 2014, Secur. Commun. Networks.
[23] Tayeb Brahimi,et al. Characterizing IOMT/Personal Area Networks Landscape , 2019, ArXiv.
[24] Yan Li,et al. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan , 2016, Comput. Biol. Medicine.
[25] Eric Becker,et al. Digital cities of the future: Extending @home assistive technologies for the elderly and the disabled , 2011, Telematics Informatics.
[26] Chunxiao Jiang,et al. Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.
[27] Yier Jin,et al. Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.
[28] James B. D. Joshi,et al. Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges , 2015 .
[29] Laura A. Dabbish,et al. "My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security , 2015, SOUPS.