A Secured Cloud based Health Care Data Management System
暂无分享,去创建一个
Khairul Anam | Nafiul Rashid | Md. Fakhrul Alam Onik | Syed Sabir Salman Al Musawi | K. Anam | Nafiul Rashid
[1] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[2] Aleksandar Milenkovic,et al. Journal of Neuroengineering and Rehabilitation Open Access a Wireless Body Area Network of Intelligent Motion Sensors for Computer Assisted Physical Rehabilitation , 2005 .
[3] Fugang Wang,et al. Cyberaide JavaScript: A JavaScript Commodity Grid Kit , 2008, 2008 Grid Computing Environments Workshop.
[4] Marco Furini,et al. International Journal of Computer and Applications , 2010 .
[5] Xi He,et al. Experiment and Workflow Management Using Cyberaide Shell , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[6] Siani Pearson,et al. Towards accountable management of identity and privacy: sticky policies and enforceable tracing services , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[7] K. Wac,et al. Mobile patient monitoring: The MobiHealth system , 2009, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[8] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[9] Young-Koo Lee,et al. Semi-Markov conditional random fields for accelerometer-based activity recognition , 2010, Applied Intelligence.
[10] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[11] Xiaohui Liang,et al. ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing , 2011, Int. J. Secur. Networks.
[12] Biao Song,et al. A framework of sensor-cloud integration opportunities and challenges , 2009, ICUIMC '09.
[13] Yacine Challal,et al. Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).
[14] Xi He,et al. Cloud Computing: a Perspective Study , 2010, New Generation Computing.
[15] Stefan Katzenbeisser,et al. Rights Management Technologies: A Good Choice for Securing Electronic Health Records? , 2007, ISSE.
[16] Heejo Lee,et al. Human Identification Through Image Evaluation Using Secret Predicates , 2007, CT-RSA.
[17] J. O'Donoghue,et al. Telemedicine: issues and implications. , 2002, Technology and health care : official journal of the European Society for Engineering and Medicine.