2009
DOI: 10.1007/978-3-642-00440-7_15
|View full text |Cite
|
Sign up to set email alerts
|

Anonymity and Application Privacy in Context of Mobile Computing in eHealth

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…Slamanig et al [19] discussed insider threats in eHealth application that the user has no guarantee that the provider always preserve the users' privacy claims; a person and her requested data are linkable to draw potentially compromising conclusion about her. Bjones et al [4] states that an electronic identity server under control of an insider attacker has the ability to impersonate every user at applications using eIDs for authentication.…”
Section: Related Workmentioning
confidence: 99%
“…Slamanig et al [19] discussed insider threats in eHealth application that the user has no guarantee that the provider always preserve the users' privacy claims; a person and her requested data are linkable to draw potentially compromising conclusion about her. Bjones et al [4] states that an electronic identity server under control of an insider attacker has the ability to impersonate every user at applications using eIDs for authentication.…”
Section: Related Workmentioning
confidence: 99%