Impact of ICT on Home Healthcare
暂无分享,去创建一个
Nicola Zannone | Milan Petkovic | Sokratis Vavilis | M. Petkovic | Nicola Zannone | Sokratis Vavilis
[1] Yan Bai,et al. A trust-aware tag-based privacy control for eHealth 2.0 , 2011, SIGITE '11.
[2] Nicola Zannone,et al. Measuring Privacy Compliance with Process Specifications , 2011, 2011 Third International Workshop on Security Measurements and Metrics.
[3] John C. Mitchell,et al. TBA : A Hybrid of Logic and Extensional Access Control Systems , 2011, Formal Aspects in Security and Trust.
[4] Jan Jürjens,et al. Verifying Cryptographic Code in C: Some Experience and the Csec Challenge , 2011, Formal Aspects in Security and Trust.
[5] Nicola Zannone,et al. Purpose Control: Did You Process the Data for the Intended Purpose? , 2011, Secure Data Management.
[6] Cem Ersoy,et al. Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.
[7] Kai Rannenberg,et al. How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project , 2010, SEC.
[8] Siani Pearson,et al. A Privacy Manager for Cloud Computing , 2009, CloudCom.
[9] Nicos Maglaveras,et al. HeartCycle: Compliance and effectiveness in HF and CAD closed-loop management , 2009, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[10] Lirong Zheng,et al. A pervasive and preventive healthcare solution for medication noncompliance and daily monitoring , 2009, 2009 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies.
[11] Colin J. Fidge,et al. A Medical Data Reliability Assessment Model , 2009, J. Theor. Appl. Electron. Commer. Res..
[12] Elisa Bertino,et al. The Challenge of Assuring Data Trustworthiness , 2009, DASFAA.
[13] Nicola Zannone,et al. Towards the development of privacy-aware systems , 2009, Inf. Softw. Technol..
[14] Liam Peyton,et al. Event-Driven Data Integration for Personal Health Monitoring , 2009 .
[15] Huan Liu,et al. Trust evaluation in health information on the World Wide Web , 2008, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[16] Femida Gwadry-Sridhar,et al. Calculating medication compliance, adherence and persistence in administrative pharmacy claims databases , 2008 .
[17] Brian Hayes,et al. What Is Cloud Computing? , 2019, Cloud Technologies.
[18] Silke Schmidt,et al. Acceptance of telemonitoring to enhance medication compliance in patients with chronic heart failure. , 2008, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.
[19] Thusitha De Silva Mabotuwana,et al. A Semantic Web Technology Based Approach to Identify Hypertensive Patients for Follow-Up/Recall , 2008, 2008 21st IEEE International Symposium on Computer-Based Medical Systems.
[20] Audun Jøsang,et al. Online Reputation Systems for the Health Sector , 2008 .
[21] Milan Petkovic,et al. Hedaquin: A Reputation-based Health Data Quality Indicator , 2008, STM@ESORICS.
[22] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[23] K. Chan,et al. Methods for evaluation of medication adherence and persistence using automated databases , 2006, Pharmacoepidemiology and drug safety.
[24] Marsha A Raebel,et al. Measurement of Adherence in Pharmacy Administrative Databases: A Proposal for Standard Definitions and Preferred Measures , 2006, The Annals of pharmacotherapy.
[25] Alexandria,et al. Recommendations for Evaluating Compliance and Persistence With Hypertension Therapy Using Retrospective Data , 2006, Hypertension.
[26] L. Osterberg,et al. Adherence to medication. , 2005, The New England journal of medicine.
[27] Peter Sewell,et al. Cassandra: flexible trust management, applied to electronic health records , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[28] Jan Marco Leimeister,et al. Trust in virtual healthcare communities: design and implementation of trust-enabling functionalities , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[29] Gail-Joon Ahn,et al. A role-based delegation framework for healthcare information systems , 2002, SACMAT '02.
[30] George Pangalos,et al. A flexible content and context-based access control model for multimedia medical image database systems , 2001, MM&Sec '01.
[31] Radu Popescu-Zeletin,et al. Proceedings of the 2001 workshop on Multimedia and security: new challenges , 2001 .
[32] Sabrina De Capitani di Vimercati,et al. Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.
[33] Pietro Iglio,et al. Role templates for content-based access control , 1997, RBAC '97.
[34] Roberto Gorrieri,et al. Foundations of Security Analysis and Design VII , 2014, Lecture Notes in Computer Science.
[35] Vijay Varadharajan,et al. Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings , 2010, SEC.
[36] Lillian Røstad. Access Control in Healthcare Information Systems , 2009 .
[37] C. Petrou. Use of Text Mining to Predict Patient Compliance , 2008 .
[38] Rob Johnson,et al. More Content - Less Control: Access Control in the Web 2.0 , 2006 .
[39] Aleksandar Milenkovic,et al. System architecture of a wireless body area sensor network for ubiquitous health monitoring , 2005 .
[40] A V Prochazka,et al. The assessment of refill compliance using pharmacy records: methods, validity, and applications. , 1997, Journal of clinical epidemiology.