Securing the e-health cloud
暂无分享,去创建一个
[1] Wei Chen,et al. Developing Electronic Health Records in Taiwan , 2010, IT Professional.
[2] Elske Ammenwerth,et al. From a paper-based transmission of discharge summaries to electronic communication in health care regions , 2006, Int. J. Medical Informatics.
[3] Ahmad-Reza Sadeghi,et al. Trusted virtual domains: Color your network , 2010, Datenschutz und Datensicherheit - DuD.
[4] Jan Marco Leimeister,et al. Open Security Issues in German Healthcare Telematics , 2010, HEALTHINF.
[5] Ren C. Luo,et al. A Resource-Sharing Platform for Trading Biomedical Intellectual Property , 2010, IT Professional.
[6] Ahmad-Reza Sadeghi,et al. Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels , 2009, TRUST.
[7] Stefan Berger,et al. TVDc: managing security in the trusted virtual datacenter , 2008, OPSR.
[8] Helmut Krcmar,et al. Security Analysis of the German Electronic Health Card's Peripheral Parts , 2009, ICEIS.
[9] Ahmad-Reza Sadeghi,et al. Transparent Mobile Storage Protection in Trusted Virtual Domains , 2009, LISA.
[10] Trent Jaeger,et al. Trusted virtual domains: toward secure distributed services , 2005 .
[11] Chris I. Dalton,et al. Towards automated security policy enforcement in multi-tenant virtual data centers , 2010, J. Comput. Secur..
[12] Roger Frost,et al. International Organization for Standardization (ISO) , 2004 .
[13] Ahmad-Reza Sadeghi,et al. Trusted Virtual Domains - Design, Implementation and Lessons Learned , 2009, INTRUST.
[14] Ahmad-Reza Sadeghi,et al. Beyond secure channels , 2007, STC '07.
[15] Scott A. Rotondo. Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.
[16] Bernhard Jansen,et al. Trusted Virtual Domains: Secure Foundations for Business and IT Services , 2005 .
[17] Ahmad-Reza Sadeghi,et al. Patterns for Secure Boot and Secure Storage in Computer Systems , 2010, 2010 International Conference on Availability, Reliability and Security.
[18] Ahmad-Reza Sadeghi,et al. Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing , 2009, ISPEC.
[19] Jochen Liedtke,et al. On micro-kernel construction , 1995, SOSP.