1 |
A. Berler, S. Pavlopoulos, D. Koutsouris, "Design of an interoperability framework in a regional healthcare system", In:Proceedings of Engineering in Medicine and Biology Society, Vol. 2, pp. 3093-3096, 2004.
|
2 |
R. Heeks, "Health information systems: Failure, success and improvisation", International journal of medical informatics Vol. 75, No. 2, pp. 125-137, 2006.
DOI
|
3 |
S.K. Katsikas, "Health care management and information systems security:awareness, training or education", In:Int. J.Med. Informatics 60, pp. 129-135, 2000.
DOI
|
4 |
S. Rafaeli, D. Hutchison, "A survey of key management for secure group communication", In:ACM Computing Surveys 35, Vol. 3, pp. 309-329, 2003.
DOI
|
5 |
T. Rindfleisch, "Privacy, information technology, and health care", In:Communications of the ACM, Vol. 40, No. 8, pp. 92-100, 1997.
DOI
|
6 |
J. Bohn, F. Gartner, H. Vogt, Dependability Issues of Pervasive Computing in a Healthcare Environment", In:Security in Pervasive Computing, Lecture Notes in Computer Science, Vol.2802, pp.53-70, 2004.
DOI
|
7 |
S. Weis, S. Sarma, R. Rivest, D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", In:Security in Pervasive Computing, Lecture Notes in Computer Science, Vol. 2802, pp. 201-212, 2004.
|
8 |
Y.B. Kim, M. Kim, Y.J. Lee, "COSMOS: a middleware platform for sensor networks and a u-healthcare service", Proceedings of the 2008 ACM symposium on Applied computing. pp. 512-513, 2008.
|
9 |
L. Zhang, B. Chu, "A Role-Based Delegation Framework for Healthcare Information Systems", In:ACM Symposium on Access Control Models And Technologies(SACMAT), pp. 125-134, 2002.
|
10 |
C. Wong, M. Gouda, S. Lam, "Secure group communications using key graphs, Networking", IEEE/ACM Transactions on Networking, Vol. 8, No. 1, pp. 16-30, 1998.
|
11 |
S. Muhammad, K. Raazi, S. Lee, Y. Lee, "A Novel Architecture for Efficient Key Management in Humanware Applications", In: Fifth International Joint Conference on INC, IMS and IDC, pp. 1918-1922, 2009.
|
12 |
S. Muhammad, K. Raazi, S. Lee, Y. Lee, "TIMAR: an efficient key management scheme for ubiquitous health care environments", In:Proceedings of the 5th International ICST Mobile Multimedia Communications Conference, London, United Kingdom, p. 33, 2009.
|
13 |
J.S. Shapiro, G. Kuperman, Health information exchange." Medical informatics: An executive primer, (Ed. Ong, KR) Healthcare Information & Management Systems Society, pp. 147-16, 2011.
|
14 |
M. Das, A. Saxena, V. Gulati, D. Phatak, "Hierarchical key management scheme using polynomial interpolation", SIGOPS Operational Systematic Review, Vol. 39, No. 1, pp. 40-47, 2005.
DOI
|
15 |
D. Dolev, A.C. Yao, On the security of public key protocols." Information Theory, IEEE Transactions on, Vol. 29, No. 2, pp. 198-208, 1983.
|