Acknowledgement
Supported by : Catholic University of Daegu
References
- M. S. Shin, H. S. Jeon, Y. W. Ju, B. J. Lee, and S.-P. Jeong, Constructing RBAC Based Security Model in u-Healthcare Service Platform, The Scientific World Journal, (2015), Volume 2015 pp. 1-13,
- S. Mohammed, J. Fiaidhi, Ubiquitous Health and Medical Informatics: The Ubiquity 2.0 Trend and Beyond, Medical Information Science Reference, (2010) ISBN 978-1-61520-777-0
- Y. Gelogo and S. W. Park, A Study on Secure Electronic Medical DB System in Hospital Environment. International Journal of Bio-Science and Bio-Technology, (2013), Vol. 5, No. 3, 2013.
- E. Lastdrager, Securing Patient Information in Medical Databases, MS Thesis, http://essay.utwente.nl/61035/, (2011)
- T. D. Gunter, and N. P. Terry, 2005 The Emergence of National Electronic Health Record Architectures in the United States and Australia: Models, Costs, and Questions, Journal of Medical Internet Research, (2005), Vol 7, No 1 (2005)
- S. Silverstein, 2009 a pivotal year in healthcare IT (2009), Drexel University. Retrieved 2014/8/27
- L. Dunlop, Electronic Health Records: Interoperability Challenges and Patient's Right for Privacy, Journal of Computer and Technology. (2007), Vol. 2 (Spring 20017)
Cited by
- Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN vol.13, pp.1, 2015, https://doi.org/10.1007/s12083-019-00745-z