Impact of ICT on Home Healthcare

[1]  Yan Bai,et al.  A trust-aware tag-based privacy control for eHealth 2.0 , 2011, SIGITE '11.

[2]  Nicola Zannone,et al.  Measuring Privacy Compliance with Process Specifications , 2011, 2011 Third International Workshop on Security Measurements and Metrics.

[3]  John C. Mitchell,et al.  TBA : A Hybrid of Logic and Extensional Access Control Systems , 2011, Formal Aspects in Security and Trust.

[4]  Jan Jürjens,et al.  Verifying Cryptographic Code in C: Some Experience and the Csec Challenge , 2011, Formal Aspects in Security and Trust.

[5]  Nicola Zannone,et al.  Purpose Control: Did You Process the Data for the Intended Purpose? , 2011, Secure Data Management.

[6]  Cem Ersoy,et al.  Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.

[7]  Kai Rannenberg,et al.  How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project , 2010, SEC.

[8]  Siani Pearson,et al.  A Privacy Manager for Cloud Computing , 2009, CloudCom.

[9]  Nicos Maglaveras,et al.  HeartCycle: Compliance and effectiveness in HF and CAD closed-loop management , 2009, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[10]  Lirong Zheng,et al.  A pervasive and preventive healthcare solution for medication noncompliance and daily monitoring , 2009, 2009 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies.

[11]  Colin J. Fidge,et al.  A Medical Data Reliability Assessment Model , 2009, J. Theor. Appl. Electron. Commer. Res..

[12]  Elisa Bertino,et al.  The Challenge of Assuring Data Trustworthiness , 2009, DASFAA.

[13]  Nicola Zannone,et al.  Towards the development of privacy-aware systems , 2009, Inf. Softw. Technol..

[14]  Liam Peyton,et al.  Event-Driven Data Integration for Personal Health Monitoring , 2009 .

[15]  Huan Liu,et al.  Trust evaluation in health information on the World Wide Web , 2008, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[16]  Femida Gwadry-Sridhar,et al.  Calculating medication compliance, adherence and persistence in administrative pharmacy claims databases , 2008 .

[17]  Brian Hayes,et al.  What Is Cloud Computing? , 2019, Cloud Technologies.

[18]  Silke Schmidt,et al.  Acceptance of telemonitoring to enhance medication compliance in patients with chronic heart failure. , 2008, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.

[19]  Thusitha De Silva Mabotuwana,et al.  A Semantic Web Technology Based Approach to Identify Hypertensive Patients for Follow-Up/Recall , 2008, 2008 21st IEEE International Symposium on Computer-Based Medical Systems.

[20]  Audun Jøsang,et al.  Online Reputation Systems for the Health Sector , 2008 .

[21]  Milan Petkovic,et al.  Hedaquin: A Reputation-based Health Data Quality Indicator , 2008, STM@ESORICS.

[22]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[23]  K. Chan,et al.  Methods for evaluation of medication adherence and persistence using automated databases , 2006, Pharmacoepidemiology and drug safety.

[24]  Marsha A Raebel,et al.  Measurement of Adherence in Pharmacy Administrative Databases: A Proposal for Standard Definitions and Preferred Measures , 2006, The Annals of pharmacotherapy.

[25]  Alexandria,et al.  Recommendations for Evaluating Compliance and Persistence With Hypertension Therapy Using Retrospective Data , 2006, Hypertension.

[26]  L. Osterberg,et al.  Adherence to medication. , 2005, The New England journal of medicine.

[27]  Peter Sewell,et al.  Cassandra: flexible trust management, applied to electronic health records , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..

[28]  Jan Marco Leimeister,et al.  Trust in virtual healthcare communities: design and implementation of trust-enabling functionalities , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[29]  Gail-Joon Ahn,et al.  A role-based delegation framework for healthcare information systems , 2002, SACMAT '02.

[30]  George Pangalos,et al.  A flexible content and context-based access control model for multimedia medical image database systems , 2001, MM&Sec '01.

[31]  Radu Popescu-Zeletin,et al.  Proceedings of the 2001 workshop on Multimedia and security: new challenges , 2001 .

[32]  Sabrina De Capitani di Vimercati,et al.  Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.

[33]  Pietro Iglio,et al.  Role templates for content-based access control , 1997, RBAC '97.

[34]  Roberto Gorrieri,et al.  Foundations of Security Analysis and Design VII , 2014, Lecture Notes in Computer Science.

[35]  Vijay Varadharajan,et al.  Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings , 2010, SEC.

[36]  Lillian Røstad Access Control in Healthcare Information Systems , 2009 .

[37]  C. Petrou Use of Text Mining to Predict Patient Compliance , 2008 .

[38]  Rob Johnson,et al.  More Content - Less Control: Access Control in the Web 2.0 , 2006 .

[39]  Aleksandar Milenkovic,et al.  System architecture of a wireless body area sensor network for ubiquitous health monitoring , 2005 .

[40]  A V Prochazka,et al.  The assessment of refill compliance using pharmacy records: methods, validity, and applications. , 1997, Journal of clinical epidemiology.