1 |
P. Robinson, H. Vogt and W. Wagealla, "Privacy, Security, and Trust Within the Context of Pervasive Computing," The Springer International Series in Engineering and Computer Science, Vol.780, 2005.
|
2 |
L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel and W. Jonker, "Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes," 2009 University of Twente, Centre for Telematics and Information Technology, Internal Report, 2009.
|
3 |
EHR핵심연구개발사업단, "건강정보보호 및 보안 체계 개발," 5세부, 2009.
|
4 |
김주한, "개인정보 암호화 한 평생기록 추진," 메디칼 업저버, 창간 5주년 기념 정책토론회, 2006.
|
5 |
X. Liang, Z. Cao, H. Lin and J. Shao, "Attribute Based Proxy Re-encryption with Delegating Capabilities," ASIACCS 2009, ACM, pp.276-286, 2009.
|
6 |
L. Ibraimi, Q. Tang, P. Hartel and W. Jonker, "A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare," 5th VLDB Workshop on Secure Data Management, SDM, pp.185-198, 2008.
|
7 |
오정연, "의료정보화 현황 및 과제," NCA CIO REPORT, 05-11 호, 한국전산원, 2006.
|
8 |
S. Y. Lim, T. H. Oh, Y. B. Choi and T. Lakshman, "Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring," Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), 2010 IEEE International Conference, pp.327-332, 2010.
|
9 |
박건희, "보건의료정보화와 개인정보보호," 서울대의대 2006년 상반기 토픽 리뷰, 2006.
|
10 |
송지은, 김신효, 정명애, 정교일, "u-헬스케어 보안 이슈 및 기술 동향," 전자통신동향분석, 제 22권 제 1호, 한국전자통신연구원, 2007.
|
11 |
M. Tentori, J. Favela and M. D. Rodriguez, "Privacy-Aware Autonomous Agents for Pervasive Healthcare," IEEE Intelligent Systems, pp.55-62, 2006.
DOI
|
12 |
J. Sun and Y. Fang, "Cross-Domain Data Sharing in Distributed Electronic Health Record System," IEEE Transactions on Parallel and Distributed Systems, pp.754-764, 2010.
|
13 |
박광용, 송유진, "속성기반 암호기술," 한국정보보호학회, 정보 보호학회지, 제20권 제2호, pp.85-92, 2010.
|