1 |
Z. Omary, f. Mtenzi, B. Wu, C. O'Driscoll, "Accessing sensitive patient information in ubiquitous healthcare systems", 2010 International conference for internet Technology and Secured Transactions(ICITST), pp. 1-3, Nov. 2010.
|
2 |
D. W. Bang, J. S. Jeong, J. H. Lee, "An imple mentation of privacy security for PHR framework supporting u-healthcare service", 2010 6th International conference on Networked Computing(INC), pp. 1-4, May. 2010.
|
3 |
E. Y. Kim, M. Lee, "Multi-agent-based U-healthcare system for Managing Hypertension", International Conference on convergence Information Technology, pp. 1694-1699, Nov. 2007.
|
4 |
Crypto++ 5.6.0 Benchmarks, http://www.cryptopp.com/benchmarks.html
|
5 |
Q. Ni, A. Trombetta, E. Bertino and J. Lobo, "Privacy-aware Role Based Access Control", The Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, pp. 41-50, Jun. 2007.
|
6 |
Q. Ni, D. Lin, E. Bertino and J. Lobo, "Conditional Privacy-aware Role Based Access Control", The Proceedings of the 12th European Symposium on Research in Computer Security, LNCS 4734, pp. 72-89, 2007.
|
7 |
T. M. Song, S. H, Jang, "u-Healthcare : Issue and Research Trends", Korea Institute for Health and Social Affairs, pp. 119-129, Jan. 2011.
|
8 |
K. J. Kim, S. P. Hong, "Privacy Information Prot ection Model in e-Healthcare Environment", Korean Society for Internet Information, Vol. 10, N., 2, pp. 29-40, Apr. 2009.
|
9 |
D. G. Kim, I. G. Song, "Need and Development of u-Healthcare Service", Korean Society for Internet Information, Vol. 1, No. 3, pp. 9-17, Sep. 2009.
|
10 |
D. H. Sin, B. J. Han, H. J. Lee, H. C. Jung, "Analysis of Security Threat in u-Healthcare Service", The Korean Institute of Information Scientists and Engineers 2010 Conferences, Vol. 37, No. 1(D), pp. 52-55, Jun. 2010.
|
11 |
S. Y. Song, H. J. Hwang, "u-Healthcare Application Framework for Medical Gateway", Korean Society for Internet Information Conference, pp. 349-353, May. 2009.
|
12 |
IHE, http://www.himss.org.
|
13 |
ITI Technical Committee, "IHE Security-XDS as a Case Study", IHE, 2006.
|
14 |
J. E. Song, S. H. Kim, M. A. Chung, K. I. Chung, "Security Issues and Its Technology Trends in u-Healthcare", Electronics and Telecommunications Trend Analysis Vol. 22, No. 1, pp. 70-86, Feb. 2007.
|
15 |
N. Gustaf, S. Mark, "An Approach to Engineer and Enforce Context Constraints in an RBAC Environment", Symposium on Access Control Models and Technologies(SACMAT 2003), pp. 65-79, Jun. 2003.
|
16 |
J. W. Byun, E. Bertino and N. Li, "Purpose based access control of complex data for privacy protection", Proceedings of the tenth ACM symposium on Access control models and technologies (SACMAT'05), pp. 102-110. Jun. 2005.
|