Secure distribution of confidential information via self-destructing data
暂无分享,去创建一个
[1] Peter J. Clarke,et al. A flexible approach for electronic medical records exchange , 2006, HIKM '06.
[2] Fay Cobb Payton,et al. Privacy of medical records: IT implications of HIPAA , 2000, CSOC.
[3] Vijay Varadharajan,et al. A Trust based Access Control Framework for P2P File-Sharing Systems , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[4] Andrew Hutchison,et al. Persistent access control: a formal model for drm , 2007, DRM '07.
[5] P. B. Schneck. Persistent access control to prevent piracy of digital information , 1999 .
[6] N.J. Davis,et al. Toward a decentralized trust-based access control system for dynamic collaboration , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[7] Lawrence O Gostin,et al. Health information privacy. , 1995, Cornell law review.
[8] Atsuko Miyaji,et al. Java Obfuscation Approaches to Construct Tamper-Resistant Object-Oriented Programs , 2005 .
[9] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[10] G. Annas. HIPAA regulations - a new era of medical-record privacy? , 2003, The New England journal of medicine.
[11] Mary Baker,et al. 2 P2P or Not 2 P2P? , 2003, IPTPS.
[12] Wuu Yang,et al. Advanced obfuscation techniques for Java bytecode , 2004, J. Syst. Softw..
[13] Wai Gen Yee,et al. Bridging a gap in the proposed personal health record , 2006, HIKM '06.
[14] Robert Morris,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.
[15] H K Huang,et al. Medical image security in a HIPAA mandated PACS environment. , 2003, Computerized medical imaging and graphics : the official journal of the Computerized Medical Imaging Society.
[16] Holt Lh,et al. Privacy of medical records. , 1980, The Record of the Association of the Bar of the City of New York.
[17] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[18] Zhiyong Feng,et al. A Trust-Based Access Control with Feedback , 2008, 2008 International Symposiums on Information Processing.