A New Security Model using Multilayer Approach for E-Health Services
暂无分享,去创建一个
Wanli Ma | Dharmendra Sharma | Rossilawati Sulaiman | Dat Tran | Wanli Ma | D. Tran | D. Sharma | Rossilawati Sulaiman
[1] Seyed A Shahrestani,et al. Ubiquitous Health Monitoring Systems: Addressing Security Concerns , 2011 .
[2] Vipul Gupta,et al. KSSL: experiments in wireless internet security , 2001 .
[3] Yuguang Fang,et al. HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare , 2011, 2011 31st International Conference on Distributed Computing Systems.
[4] W.D. Yu,et al. A web-based wireless mobile system design of security and privacy framework for u-Healthcare , 2008, HealthCom 2008 - 10th International Conference on e-health Networking, Applications and Services.
[5] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[6] Milan Markovic. On Secure e-Health Systems , 2006, Privacy in Statistical Databases.
[7] Wanli Ma,et al. A Multi-agent Security Framework for e-Health Services , 2007, KES.
[8] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[9] Tom Cross,et al. Emerging Cyber Threats Report for 2009 , 2008 .
[10] Ling Liu,et al. Security Models and Requirements for Healthcare Application Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[11] Ramon Martí,et al. Network and Application Security in Mobile e-Health Applications , 2004, ICOIN.
[12] Jeff Wilson,et al. Securing a wireless network , 2002, SIGUCCS '02.
[13] R. Colemon. Securing Wireless Networks , 2004 .
[14] Dan Ionescu,et al. Privacy and security shield for health information systems (e-Health) , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[15] O. Bratislava. Practical cryptography-the key size problem : PGP after years , 2001 .
[16] Hossein Bidgoli. The Internet Encyclopedia , 2003 .
[17] Klaus Wehrle,et al. Security for pervasive healthcare , 2009, 2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous.
[18] Charles P. Pfleeger,et al. Security in computing , 1988 .
[19] Bruce Schneier,et al. Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists , 1996 .