[HTML][HTML] Security and privacy in electronic health records: A systematic literature review
JL Fernández-Alemán, IC Señor, PÁO Lozoya… - Journal of biomedical …, 2013 - Elsevier
OBJECTIVE: To report the results of a systematic literature review concerning the security
and privacy of electronic health record (EHR) systems. DATA SOURCES: Original articles …
and privacy of electronic health record (EHR) systems. DATA SOURCES: Original articles …
Pervasive healthcare and wireless health monitoring
U Varshney - Mobile Networks and Applications, 2007 - Springer
With an increasingly mobile society and the worldwide deployment of mobile and wireless
networks, the wireless infrastructure can support many current and emerging healthcare …
networks, the wireless infrastructure can support many current and emerging healthcare …
A rule-based framework for role-based delegation and revocation
L Zhang, GJ Ahn, BT Chu - … on Information and System Security (TISSEC …, 2003 - dl.acm.org
Delegation is the process whereby an active entity in a distributed environment authorizes
another entity to access resources. In today's distributed systems, a user often needs to act …
another entity to access resources. In today's distributed systems, a user often needs to act …
Securing electronic medical records using attribute-based encryption on mobile devices
We provide a design and implementation of self-protecting electronic medical records
(EMRs) using attribute-based encryption on mobile devices. Our system allows healthcare …
(EMRs) using attribute-based encryption on mobile devices. Our system allows healthcare …
Wellness sensor networks: A proposal and implementation for smart home for assisted living
In recent times, wireless sensor networks (WSNs) have become the backbone of many
systems. Smart homes based on WSN protocols are used to provide an assisted living …
systems. Smart homes based on WSN protocols are used to provide an assisted living …
Extending access control models with break-glass
Access control models are usually static, ie, permissions are granted based on a policy that
only changes seldom. Especially for scenarios in health care and disaster management, a …
only changes seldom. Especially for scenarios in health care and disaster management, a …
Programming pervasive and mobile computing applications with the TOTA middleware
Pervasive computing calls for suitable middleware and programming models to deal with
large software systems dived in dynamic mobile network environments. Here we present the …
large software systems dived in dynamic mobile network environments. Here we present the …
Cloud-assisted mobile-access of health data with privacy and auditability
Motivated by the privacy issues, curbing the adoption of electronic healthcare systems and
the wild success of cloud service models, we propose to build privacy into mobile healthcare …
the wild success of cloud service models, we propose to build privacy into mobile healthcare …
[PDF][PDF] A framework for modeling privacy requirements in role engineering
Q He, AI Antón - Proc. of REFSQ, 2003 - crinfo.univ-paris1.fr
Privacy protection is important in many industries, such as healthcare and finance.
Capturing and modeling privacy requirements in the early stages of system development is …
Capturing and modeling privacy requirements in the early stages of system development is …
[PDF][PDF] Dynamic, context-aware access control for distributed healthcare applications
J Hu, AC Weaver - Workshop on Privacy, Security, and Trust, 2004 - Citeseer
The rapid worldwide deployment of the Internet and Web is the enabler of a new generation
of e-healthcare applications, but the provision of a security architecture that can ensure the …
of e-healthcare applications, but the provision of a security architecture that can ensure the …