PKI Security in Large-Scale Healthcare Networks
- Published: 09 Sep 2010 Journal: Journal of Medical Systems, volume 36, pages 1,107-1,116 (issn: 0148-5598, eissn: 1573-689X,
Copyright policy)
- Publisher: Springer Science and Business Media LLC
- Country: United Kingdom
- City, University of London United Kingdom
- 1
- 2
1. Adams, C., and Just, M., PKI: Ten Years Later. Proceedings of the 3rd Annual PKI R&D Workshop. 69-84, 2004.
2. Al-Nayadi, F., and Abawajy, J. H., An Authentication Framework for e-Health Systems. Proceedings of the 7th IEEE International Symposium on Signal Processing and Information Technology. 616-620, 2007
3. Chadwick, D. W., Mundy, D., and New J., Experiences of using a PKI to access a hospital information system by high street opticians. Computer Communications. Elsevier. 26: 1893-1903, 2003.
4. Ferreira, A., Cruz-Correia, R., Antunes, L., and Chadwick, D., Access Control: how can it improve patients' healthcare?. Studies in Health Technology and Informatics. IOS Press. 127: 65-76, 2007. [OpenAIRE]
5. Gomes, H., Cunha, J. P., and Zúquete, A., Authentication Architecture for eHealth Professionals. Meersman, R., Tari Z. (eds.), OTM 2007, Part II, LNCS. Springer. 4804: 1583-1600, 2007. [OpenAIRE]
6. Han, S., Skinner, G., Potdar, V., and Chang, E., A Framework of Authentication and Authorization for e-Health Service Systems. Proceedings of the 3rd ACM workshop on Secure web services. 105-106, 2006.
7. Hu, J., Chen, H-H., and Hou, T-W., A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Computer Standards & Interfaces. Elsevier. 32: 274 - 280, 2010.
8. Kambourakis, G., Maglogiannis, I., and Rouskas, A., PKI-based secure mobile access to electronic health services and data. Technology and Health Care. IOS Press. 13: 511-526, 2005. [OpenAIRE]
9. Komninos, N., PKI Systems. Douligeris, C., and Serpanos, D. N. (eds.), Network Security: Current Status and Future Directions. Wiley - IEEE Press. 409-418, 2007.
10. Lopez, J., Oppliger, R., and Pernul, G., Authentication and authorization infrastructures (AAIs): a comparative survey. Computers & Security. Elsevier. 23: 578-590, 2004. [OpenAIRE]
11. Menezes, A. J., Vanstone, S. A. and Van Oorschot, P. C., Handbook of Applied Cryptography. CRC Press, Inc. 2004.
12. Polk, W. T., Hastings, N. E., and Malpani, A., Public Key Infrastructures that Satisfy Security Goals. IEEE Internet Computing. 7: 60-67, 2003. [OpenAIRE]
13. Rifà-Pous, H., and Herrera-Joancomartí, J., An interdomain PKI model based on trust lists. Lopez, J., Samarati P., and Ferrer, J. L. (eds.), Proceedings of the 4th European PKI Workshop: Theory and Practice (EuroPKI 2007), LNCS. Springer. 4582: 49-64, 2007.
14. Voss, H., Heimly, V., and Sjögren, L. H., The Baltic Health Network - taking secure, Internet-based healthcare networks to the next level. Engelbrecht, R. Geissbuhler, A., Lovis, C., and Mihalas G. (eds.), Connecting Medical Informatics and Bio-Informatics: Proceedings of MIE2005. 421-426, 2005.
15. Wilson, S., Public Key Superstructure “It's PKI Jim, But Not As We Know It!”. Proceedings of the 7th symposium on Identity and trust on the Internet. 72-88, 2008.
- 1
- 2