Enabling Robust Information Accountability in E-healthcare Systems
暂无分享,去创建一个
[1] Ron Steinfeld,et al. Universal Designated-Verifier Signatures , 2003, ASIACRYPT.
[2] James A. Hendler,et al. Information accountability , 2008, CACM.
[3] Lawrence O Gostin,et al. Health information privacy. , 1995, Cornell law review.
[4] Laurie Williams,et al. Modifying Without a Trace : General Audit Guidelines are Inadequate for Electronic Health Record Audit Mechanisms , 2011 .
[5] Abhinav Srivastava,et al. Protecting E-healthcare Client Devices against Malware and Physical Theft , 2010, HealthSec.
[6] M. Eric Johnson,et al. Data Hemorrhages in the Health-Care Sector , 2009, Financial Cryptography.
[7] Laurie A. Williams,et al. Modifying without a trace: general audit guidelines are inadequate for open-source electronic health record audit mechanisms , 2012, IHI '12.
[8] Steven Willmott,et al. Privacy Issues of Provenance in Electronic Healthcare Record Systems , 2006 .
[9] Whitney Walters,et al. Medical identity theft. , 2011, Optometry.
[10] Daisuke Mashima,et al. Enhancing accountability of electronic health record usage via patient-centric monitoring , 2012, IHI '12.
[11] Luc Moreau,et al. Provenance-Based Auditing of Private Data Use , 2008, BCS Int. Acad. Conf..
[12] Beng Chin Ooi,et al. Privacy and ownership preserving of outsourced medical data , 2005, 21st International Conference on Data Engineering (ICDE'05).
[13] Paul T. Groth,et al. The provenance of electronic data , 2008, CACM.