On Secure Data Management in Health-Care Environment
暂无分享,去创建一个
Francesco Palmieri | Alfredo De Santis | Arcangelo Castiglione | Aniello Castiglione | Ciriaco D'Ambrosio | A. D. Santis | Arcangelo Castiglione | C. D’Ambrosio | Aniello Castiglione | F. Palmieri
[1] Jon Postel,et al. User Datagram Protocol , 1980, RFC.
[2] A. Dowling. Do Hospital Staff Interfere with Computer System Implementation? , 1980, Health care management review.
[3] P. Carpenter. Use and Impact of Computers in Clinical Medicine , 1987 .
[4] J. Reggia,et al. HELP: A Dynamic Hospital Information System , 1991, Computers and Medicine.
[5] M. J. Goldschmidt,et al. Craniomaxillofacial trauma in the elderly. , 1995, Journal of oral and maxillofacial surgery : official journal of the American Association of Oral and Maxillofacial Surgeons.
[6] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[7] Viergever,et al. An Overview of Medical Image Registration Methods , 1998 .
[8] T. K. Ong,et al. Craniofacial trauma presenting at an adult accident and emergency department with an emphasis on soft tissue injuries. , 1999, Injury.
[9] Nicholas Ayache,et al. Medical Image Analysis: Progress over Two Decades and the Challenges Ahead , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[10] P. V. Biron,et al. The HL7 Clinical Document Architecture. , 2001, Journal of the American Medical Informatics Association : JAMIA.
[11] Jerry L Prince,et al. Current methods in medical image segmentation. , 2000, Annual review of biomedical engineering.
[12] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[13] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[14] Michael M. Wagner,et al. Technical Description of RODS: A Real-time Public Health Surveillance System , 2003, Journal of the American Medical Informatics Association.
[15] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[16] Bogdan M. Wilamowski,et al. The Transmission Control Protocol , 2005, The Industrial Information Technology Handbook.
[17] Amnon Shabo,et al. Model Formulation: HL7 Clinical Document Architecture, Release 2 , 2006, J. Am. Medical Informatics Assoc..
[18] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[19] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[20] Eric Rescorla,et al. Datagram Transport Layer Security , 2006, RFC.
[21] Ingmar Baumgart,et al. S/Kademlia: A practicable approach towards secure key-based routing , 2007, 2007 International Conference on Parallel and Distributed Systems.
[22] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[23] Martha Giangiulio,et al. Initiation and Evaluation of an Admission, Discharge, Transfer (ADT) Nursing Program in a Pediatric Setting , 2008, Issues in comprehensive pediatric nursing.
[24] Rossano Schifanella,et al. Tempering Kademlia with a Robust Identity Based System , 2008, 2008 Eighth International Conference on Peer-to-Peer Computing.
[25] Eric Rescorla,et al. Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP) , 2010, RFC.
[26] Alfredo De Santis,et al. Efficient provably-secure hierarchical key assignment schemes , 2007, Theor. Comput. Sci..
[27] Alfredo De Santis,et al. E-mail-Based Covert Channels for Asynchronous Message Steganography , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[28] Hemanta Kumar Kalitay,et al. Designing WANem : A Wide Area Network emulator tool , 2011, COMSNETS.
[29] Alfredo De Santis,et al. An asynchronous covert channel using spam , 2012, Comput. Math. Appl..
[30] Oleg S. Pianykh,et al. Digital Imaging and Communications in Medicine (DICOM) , 2017, Radiopaedia.org.
[31] Balraj Naren,et al. Medical Image Registration , 2022 .