The Scalability and the Strategy for EMR Database Encryption Techniques |
Shin, David
(Computer Science Discipline, Faculty of Science and Technology (FaST))
Sahama, Tony (Computer Science Discipline, Faculty of Science and Technology (FaST)) Kim, Steve Jung-Tae (Dept. of Electronic Eng., Mokwon University) Kim, Ji-Hong (Dept. of Info. & Com. Eng., Semyung University) |
1 | Grimson J, Grimson, W, and Hasselbring W. The SI Challenge in Health Care. Communications of the ACM 2009: 43(6): 49-55. |
2 | Wei, Z., et al. A tuple-oriented bucket paritition index with minimum weighted mean of interferential numbers for DAS models. in Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on. 2010. |
3 | Zhong, M., et al., Optimizing data popularity conscious bloom filters, in Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing. 2008, ACM: Toronto, Canada. p. 355-364. |
4 | Essin, D.J. and T.L. Lincoln,Healthcare information architecture: elements of a new paradigm, in Proceedings of the 1994 workshop on New security paradigms. 1994, IEEE Compuer Society Press: Little Compton, Rhode Island, United States. p. 32-41. |