Computers at risk: safe computing in the information age
Computers at risk: safe computing in the information age
The computer-based patient record: an essential technology for health care
The computer-based patient record: an essential technology for health care
Distributed computing: implementation and management strategies
Distributed computing: implementation and management strategies
Practical Unix and Internet security (2nd ed.)
Practical Unix and Internet security (2nd ed.)
For the Record: Protecting Electronic Health Information
For the Record: Protecting Electronic Health Information
Journal of Medical Systems
Configuration agents, control and privacy
CUU '00 Proceedings on the 2000 conference on Universal Usability
Security issues for implementation of e-medical records
Communications of the ACM
Authorization and Access Control of Application Data in Workflow Systems
Journal of Intelligent Information Systems - Special issue: A survey of research questions for intelligent information systems in education
Recent Coursebooks and Articles of Interest: Bibliography Update '98
ACM SIGCAS Computers and Society
Cognitive Fuzzy Modeling for Enhanced Risk Assessment in a Health Care Institution
IEEE Intelligent Systems
The inference problem: a survey
ACM SIGKDD Explorations Newsletter
Towards a secure web-based healthcare application
Knowledge media in healthcare
A Privacy Policy Model for Enterprises
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
The use of smart devices in eHealth
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
Supporting ethical problem solving: an exploratory investigation
Proceedings of the 2004 SIGMIS conference on Computer personnel research: Careers, culture, and ethics in a networked environment
Supporting information access in a hospital ward by a context-aware mobile electronic patient record
Personal and Ubiquitous Computing
An Extended Privacy Calculus Model for E-Commerce Transactions
Information Systems Research
Consent Mechanisms for Electronic Health Record Systems: A Simple Yet Unresolved Issue
Journal of Medical Systems
Securing grid data using mandatory access controls
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact
International Journal of Electronic Commerce
Exploring context-awareness for ubiquitous computing in the healthcare domain
Personal and Ubiquitous Computing
Internet privacy concerns and beliefs about government surveillance - An empirical investigation
The Journal of Strategic Information Systems
Guidelines for designing graphical authentication mechanism interfaces
International Journal of Information and Computer Security
Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Towards a security policy for ubiquitous healthcare systems
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
A novel use of RBAC to protect privacy in distributed health care information systems
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
A Personal Data Audit Method through Requirements Engineering
Computer Standards & Interfaces
Barriers to the adoption and use of personal health record systems
Proceedings of the 2011 iConference
A rights management approach to protection of privacy in a cloud of electronic health records
Proceedings of the 11th annual ACM workshop on Digital rights management
On the commonality of iris biometrics
Proceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia
Unauthorized inferences in semistructured databases
Information Sciences: an International Journal
A novel watermarking method for software protection in the cloud
Software—Practice & Experience
Enhancing electronic medical record retrieval through semantic query expansion
Information Systems and e-Business Management
Journal of Medical Systems
PrivComp: a privacy-aware data service composition system
Proceedings of the 16th International Conference on Extending Database Technology
Secure and privacy-preserving execution model for data services
CAiSE'13 Proceedings of the 25th international conference on Advanced Information Systems Engineering
Fuzzy Assessment of Health Information System Users' Security Awareness
Journal of Medical Systems
Hi-index | 48.23 |