Comprehensive user requirements engineering methodology for secure and interoperable health data exchange
暂无分享,去创建一个
Vassilis Koutkias | Dimitrios Tzovaras | Erol Gelenbe | Luigi Coppolino | Oana Stan | Pantelis Natsiavas | Jos Dumortier | Giuliana Faiella | Luigi Romano | Isaac Cano | Marco Nalin | Fabrizio Clemente | Ioannis Komnios | Evangelos Grivas | Jan Petersen | Paolo Campegiani | Janne Rasmussen | Maja Voss-Knude | Κostas Votis | David Marí | E. Gelenbe | J. Dumortier | L. Romano | D. Tzovaras | P. Campegiani | Isaac Cano | V. Koutkias | F. Clemente | M. Nalin | L. Coppolino | E. Grivas | Ioannis Komnios | P. Natsiavas | O. Stan | G. Faiella | Janne Rasmussen | David Marí | Jan Petersen | Maja Voss-Knude | Κostas Votis | Oana Stan
[1] Shai Halevi,et al. Homomorphic Encryption , 2017, Tutorials on the Foundations of Cryptography.
[2] Richard M. Schneider,et al. A comparison of information security risk analysis in the context of e-government to criminological threat assessment techniques , 2010, InfoSecCD.
[3] Gareth Niblett. Threats and Countermeasures , 2012 .
[4] Ilídio Castro Oliveira,et al. OpenNCP: a novel framework to foster cross-border e-Health services , 2015, MIE.
[5] A. Tubaishat,et al. Perceived usefulness and perceived ease of use of electronic health records among nurses: Application of Technology Acceptance Model , 2018, Informatics for health & social care.
[6] Vassilis Koutkias,et al. Identification of Barriers and Facilitators for eHealth Acceptance: The KONFIDO Study , 2017, BHI 2017.
[7] Samuel Fricker,et al. Requirements Engineering: Best Practice , 2015 .
[8] Pratyusa K. Manadhata,et al. The Operational Role of Security Information and Event Management Systems , 2014, IEEE Security & Privacy.
[9] Gerd Stefan Brost,et al. Identifying Security Requirements and Privacy Concerns in Digital Health Applications , 2015 .
[10] Vassilis Koutkias,et al. Gap Analysis for Information Security in Interoperable Solutions at a Systemic Level: The KONFIDO Approach , 2018 .
[11] Leonid Kof. Requirements Analysis: Concept Extraction and Translation of Textual Specifications to Executable Models , 2009, NLDB.
[12] Mojca Volk,et al. How to Elicit, Analyse and Validate Requirements for a Digital Health Solution , 2015 .
[13] Vassilis Koutkias,et al. An OpenNCP-based Solution for Secure eHealth Data Exchange , 2018, J. Netw. Comput. Appl..
[14] Henry L. Roediger,et al. Research Methods in Psychology , 1985 .
[15] Lenis R. Wong,et al. A SYSTEMATIC LITERATURE REVIEW ABOUT SOFTWARE REQUIREMENTS ELICITATION , 2017 .
[16] L. Jean Camp,et al. Threat analysis of online health information system , 2010, PETRA '10.
[17] Dimitris Syvridis,et al. Physical Unclonable Function based on a Multi-Mode Optical Waveguide , 2018, Scientific Reports.
[18] Tiago Oliveira,et al. Electronic Health Record Portal Adoption: a cross country analysis , 2017, BMC Medical Informatics and Decision Making.
[19] H. Krumholz,et al. Blockchain Technology: Applications in Health Care , 2017, Circulation. Cardiovascular quality and outcomes.
[20] J.A. Adam. Data security-threats and countermeasures , 1992, IEEE Spectrum.
[21] Paul Voigt,et al. The EU General Data Protection Regulation (GDPR) , 2017 .
[22] Luigi Coppolino,et al. KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level Among eHealth Services Across Europe , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[23] Robert Wille,et al. Automated and quality-driven requirements engineering , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[24] Jang-Eui Hong,et al. Deriving use cases from business processes: a goal-oriented transformational approach , 2017, SAC.