Securing Medical SaaS solutions using a Novel End-to-End Encryption Protocol
暂无分享,去创建一个
Jonas Repschläger | Rüdiger Zarnekow | Axel Küpper | Mathias Slawik | Tatiana Ermakova | Axel Küpper | Jonas Repschläger | Rüdiger Zarnekow | Tatiana Ermakova | Mathias Slawik
[1] Samee Ullah Khan,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 , 2008 .
[2] Jian-Guo Bau,et al. Secure Dynamic Access Control Scheme of PHR in Cloud Computing , 2012, Journal of Medical Systems.
[3] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[4] Samir Chatterjee,et al. A Design Science Research Methodology for Information Systems Research , 2008 .
[5] R.T.Subhalakshmi,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption , 2016 .
[6] Mathias Slawik,et al. The Trusted Cloud Transfer Protocol , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[7] J. Hintze,et al. Violin plots : A box plot-density trace synergism , 1998 .
[8] Alan R. Hevner,et al. Design Research in Information Systems: Theory and Practice , 2010 .
[9] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[10] Roy Fielding,et al. Architectural Styles and the Design of Network-based Software Architectures"; Doctoral dissertation , 2000 .