Security and trust in virtual healthcare communities
暂无分享,去创建一个
[1] Andrew D. Gordon,et al. Design and Semantics of a Decentralized Authorization Language , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[2] H. Humphrey,et al. Standards for privacy of individually identifiable health information. , 2003, Health care law monthly.
[3] Marianne Winslett,et al. Protecting Privacy during On-Line Trust Negotiation , 2002, Privacy Enhancing Technologies.
[4] U. S. Office for Civil Rights,et al. Guidance introduction and overview. Standards for Privacy of Individually Identifiable Health Information , 2002 .
[5] Ing Widya,et al. Mobihealth: Mobile Services for Health Professionals , 2006 .
[6] Angelos D. Keromytis,et al. Dynamic Trust Management , 2009, Computer.
[7] Laura H Schopp,et al. Design of a peer-to-peer telerehabilitation model. , 2004, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.
[8] B Stanberry,et al. Legal and ethical aspects of telemedicine , 1998, Journal of telemedicine and telecare.
[9] Iraklis Varlamis,et al. A Holistic Perspective of Security in Health Related Virtual Communities , 2009 .
[10] Shamik Sural,et al. Security analysis and implementation of web-based telemedicine services with a four-tier architecture , 2008, 2008 Second International Conference on Pervasive Computing Technologies for Healthcare.
[11] H. S. Ng,et al. Security issues of wireless sensor networks in healthcare applications , 2006 .
[12] Asuman Dogac,et al. SAPHIRE: A Multi-Agent System for Remote Healthcare Monitoring through Computerized Clinical Guidelines , 2007 .
[13] B Stanberry,et al. The legal and ethical aspects of telemedicine. 2: Data protection, security and European law , 1998, Journal of telemedicine and telecare.
[14] Robert A. Greenes,et al. SMART--an integrated wireless system for monitoring unattended patients. , 2008, Journal of the American Medical Informatics Association : JAMIA.
[15] Stuart McClure,et al. Hacking Exposed; Network Security Secrets and Solutions , 1999 .
[16] Yue Wang,et al. A Trust Management Model for Virtual Communities , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).
[17] Helmut Krcmar,et al. Virtual communities in health care , 2004 .
[18] Matt Welsh,et al. Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.
[19] Peter Sewell,et al. Cassandra: flexible trust management, applied to electronic health records , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[20] George Kurtz,et al. Hacking Exposed , 2005 .
[21] George Demiris,et al. Hospice staff attitudes towards telehospice , 2004, The American journal of hospice & palliative care.
[22] Athina Lazakidou,et al. Handbook of Research on Distributed Medical Informatics and E-Health , 2008 .
[23] Xin Wang,et al. XrML -- eXtensible rights Markup Language , 2002, XMLSEC '02.
[24] J. Lebak,et al. Interoperability and Security in Wireless Body Area Network Infrastructures , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.