Browse > Article

u-헬스케어 서비스에서의 정보보호 기술 동향  

Yun, Eun-Jun (경일대학교)
Publication Information
Keywords
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 J.E. Song et al., "Security Issues and Its Technology Trends in u-Healthcare", ETRI, Electronics and Telecommunications Trends, vol.22, no.1, 2007.
2 IDC, "IDC Expects Healthy Worldwide Investments in IT with Highest U.S. Growth Rates in Healthcare and Communications and Media," 2006.
3 S.H. Park, "Meet the IT and BT", ETRI, 2008.
4 J.h. Park, S.Y. Kang, "A Research on Information SecurityIssue of RFID in U - Healthcare Environment", Journal of Security Engineering, vol.5, no.5, pp.359-370, 2008.
5 E.J. Yoon, K.Y. Yoo, "Patient Authentication System for Medical Information Security using RFID", The Journal of Korea Information and Communications Society, vol.35, no.6, pp.962-969, 2010.
6 Lekkas, D., and Gritzalis, D., "Long-term verifiability of the electronic healthcare records authenticity". Int. J. Med. Inform. 76(5):442-448, 2007.   DOI
7 Pharow, P., and Blobel, B., "Electronic signatures for long-lasting storage purposes in electronic archives". Int. J. Med. Inform. 74(2):279-287, 2005.   DOI
8 Kluge, W. E. H., "Secure e-Health: managing risks to patient health data". Int. J. Med. Inform. 76(5):402-406, 2007.   DOI
9 Ahmad, N., "Restrictions on cryptography in India . A case study of encryption and privacy", Comput. Law Secur. Rev., Volume 25, Issue 2, pp.173-180, 2009.   DOI
10 Takeda, H. et al., "An assessment of PKI and networked electronic patient record system: lessons learned from real patient data exchange at the platform of OCHIS (Osaka Community Healthcare Information System)". Int. J. Med. Inform. 73(3):311-316, 2004.   DOI
11 Hu, J., Chen, H.H., "A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations". Compu. Stand. Interfaces., 2009
12 van der Linden, H., Kalra, D., Hasman, A., and Talmon, J., Inter-organizational future proof EHR systems: a review of the security and privacy related issues. Int. J. Med. Inform. 78:3, 2009.
13 Sucurovic, S., "Implementing security in a distributed web-based EHCR". Int. J. Med. Inform. 76(5):491-496, 2007.   DOI
14 Bonacina, S. et al., "Modelling, designing, and implementing a family-based health record prototype". Comput. Biol. Med. 40(6):580-590, 2010.   DOI
15 Gobi, M., and Vivekanandan, K., "A new digital envelope approach for secure electronic medical records.", IJCSNS Int. J. Comput. Sci. Netw. Secur., VOL. 9 No.1, January 2009.
16 Yu-Yi Chen, Jun-Chao Lu, Jinn-Ke Jan, "A Secure EHR System Based on Hybrid Clouds.", J Med Syst, 36:3375-3384, 2012.   DOI
17 Tsung-Chih Hsiao, Zhen-Yu Wu, Yu-Fang Chung, Tzer-Shyong Chen, Gwo-Boa Horng, "A Secure Integrated Medical Information System", J Med Syst., 36:3103-3113, 2012.   DOI
18 Ateniese, G., and Medeiros, B., "Anonymous e-prescriptions. In proc. Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society", Washington, DC, USA, November 21, 2002.
19 Yang, Y., Han, X., Bao, F., and Deng, R. H., "A smart-card-enabled privacy preserving e-prescription system". IEEE Trans. Inf. Technol. Biomed. 8(1):47-58, 2004.   DOI
20 Chien-Lung Hsu, Chung-Fu Lu, "A Security and Privacy Preserving E-Prescription System Based on Smart Cards", J Med Syst (2012) DOI 10.1007/ s10916-012-9838-y.
21 Cheng, X., "A new approach to group signature schemes". Journal of computers 6(4):812-817, 2011.
22 Tsung-Chih Hsiao et al., "An Authentication Scheme to Healthcare Security under Wireless Sensor Networks", J Med Syst (2012) DOI 10.1007/s10916- 012-9839-x.
23 Wu, Z. Y., Lee, Y. C., Lai, F., Lee H. C., and Chung, Y., "A secure authentication scheme for telecare medicine information systems". J. Med. Syst. doi: 10.1007/s10916-010-9614-9, 2010.
24 He, D. B., Chen, J. H., and Zhang, R., "A more secure authentication scheme for telecare medicine information systems". J. Med. Syst. doi: 10.1007/s10916-011-9658-5, 2011.
25 Wei, J., Hu, X., Liu, W., " AnImproved Authentication Scheme for Telecare Medicine Information Systems", J. Med. Syst. doi: 10.1007/ s10916-012-9835-1, 2012.
26 Zhian Zhu, "An Efficient Authentication Scheme for Telecare Medicine Information Systems", J. Med. Syst. doi: 10.1007/s10916-012-9856-9, 2012.
27 K. Van Dam, S. Pitchers, and M. Barnard, "Body area networks: Towards a wearable future," in Proceedings of WWRF kick off meeting,, March 2001.
28 L. Benoit, B. Braem, I. Moerman, C. Blondia, and P. Demeester, "A survey on wireless body area networks," Wireless Networks, pp. 1.18, 2010.
29 Georgios Selimis et al, "A Lightweight Security Scheme for Wireless Body Area Networks: Design", Energy Evaluation and Proposed Microprocessor Design, Journal of Medical Systems, vol. 35(5), pp. 1289-1298, 2011.   DOI
30 CY Poon et al, "A Novel Biometrics Method to Secure Wireless Body Area Sensor Networks for Telemedicine and M-Health", IEEE Communications Magazine, pp. 73-81, 2006.
31 H. S. Ng, M. L. Sim, and C. M. Tan, "Security issues of wireless sensor networks in healthcare applications," BT Technology Journal, vol. 24, no. 2, pp. 138-144, 2006.   DOI
32 D. Singelee et al., "A secure low-delay protocol for multi-hop wireless body area networks," Ad-hoc, Mobile and Wireless Networks, pp. 94-107, Sep. 20, 2008.
33 P. Szczechowiak et al., "NanoECC: Testing the limits of elliptic curve cryptography in sensor networks," Proceedings of the 5th European conference on Wireless Sensor Networks, LNCS 4913, pp. 305-320, Springer-Verlag, 2008.
34 L. Uhsadel, A. Poschmann, and C. Paar, "Enabling full-size public-key algorithms on 8-bit sensor nodes," Proceedings of European Workshop on Security in Ad-Hoc and Sensor Networks, LNCS 4572, pp. 73-86, Springer-Verlag, 2007.
35 K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "EKG-based key agreement in body sensor networks," IEEE Conference on Computer Communications Workshops, pp. 1-6, 2008.
36 H.S. Ahn et al., "A Practical Authentication System for Wireless Body Area Networks(WBAN)", The Journal of Korea Information and Communications Society, vol.37, no.4, pp.290-296, 2012.
37 Sana Ullah et al., "A Comprehensive Survey of Wireless Body Area Networks", Journal of Medical Systems, pp. 1-30, 2010.
38 E. Jovanov et al., "A Wireless Body Area Network of Intelligent Motion Sensors for Computer Assisted Physical Rehabilitation," J. NeuroEng. and Rehab., vol. 2, no. 11, p. 6, Mar. 2005.   DOI
39 S.T. Ali et al., "Authentication of Lossy Datain Body - SensorNetworks for Health care Monitoring,"2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks(SECON), pp.470- 478, 2012.
40 M. Masi et al., "Security Analysis of Standards- Driven Communication Protocols for Healthcare Scenarios", J Med Syst (2012) DOI 10.1007/s10916- 012-9843-1.
41 Nikooghadam et al., "Secure Communication of Medical Information Using Mobile Agents", J Med Syst (2012) DOI 10.1007/s10916-012-9857-8.
42 Chen, T. L., Chung, Y. F., and Lin, F. Y. S., "Deployment of secure mobile agents for medical information systems". J. Med. Syst., 2011. doi:10.1007/s10916-011-9716-z.
43 Wu, S., and Chen K. "An efficient key-management scheme for hierarchical access control in e-medicine system". J. Med. Syst., Springer, doi:10.1007/ s10916-011-9700-7, 2011.
44 Huang, K. H., Chung, Y. F., Liu, C. H., Lai, F., and Chen, T. S., "Efficient migration for mobile computing in distributed networks". Comput. Stand. Int. 31:40-47, 2009.   DOI
45 Liu, C. H., Chung, Y. F., Chen, Th, and De Wang, S., "Mobile agent application and integration in electronic anamnesis system". J. Med. Syst., 2011. doi:10.1007/s10916-010-9563-3.
46 Nikooghadam, M, Safaei F., and Zakerolhosseini A. "An efficient key management scheme for mobile agents in distributed networks", IEEE, 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010), 2010.
47 Chen, T. L., Chung, Y. F., and Lin, F. Y. S., "A study on agent-based secure scheme for electronic medical record system". J. Med. Syst., 2010. doi:10.1007/s10916-010-9595-8.
48 Uluta et al., "Medical image security and EPR hiding using Shamir's secret sharing scheme", The Journal of Systems and Software, vol.84, pp.341-353, 2011.   DOI