Proceedings of the 1st ACM International Health Informatics Symposium 2010
DOI: 10.1145/1882992.1883024
|View full text |Cite
|
Sign up to set email alerts
|

Securing the e-health cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
93
0
6

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 194 publications
(103 citation statements)
references
References 14 publications
0
93
0
6
Order By: Relevance
“…The solution provided in the paper includes client platform security and combines with network security concepts. The security and privacy issues in modern distributed e-health system are discussed [7].…”
Section: Related Workmentioning
confidence: 99%
“…The solution provided in the paper includes client platform security and combines with network security concepts. The security and privacy issues in modern distributed e-health system are discussed [7].…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [10] present a method of protecting data from certain parties while making it available to others. In their paper, the authors suggest dividing patient health records into domains, with certain information available to some domains but not others.…”
Section: Related Researchmentioning
confidence: 99%
“…She determines which all users shall have access to her medical record. User controlled read/write access and revocation are the two core security objectives for any electronic health record system [6]. User controlled writes access control in PHR context entitles prevention of unauthorized users to gain access to the record and modifying it.…”
Section: 1design Goalsmentioning
confidence: 99%