An integrated holistic model for an eHealth system: A national implementation approach and a new cloud-based security model
S Al-Sharhan, E Omran, K Lari - International Journal of Information …, 2019 - Elsevier
Although its structure and strategies are rapidly evolving, the impact of the eHealth on the
healthcare services is evident. Implementing eHealth systems on a national level can …
healthcare services is evident. Implementing eHealth systems on a national level can …
[PDF][PDF] 一个基于博弈理论的隐私保护模型
张伊璇, 何泾沙, 赵斌, 朱娜斐 - 计算机学报, 2016 - cjc.ict.ac.cn
摘要作为计算机网络用户十分关注的问题之一(隐私保护是信息安全领域当前的一个研究热点:
目前的隐私保护方案主要分为匿名和访问控制两大类(它们通过使用不同的技术手段防止用户 …
目前的隐私保护方案主要分为匿名和访问控制两大类(它们通过使用不同的技术手段防止用户 …
A game-theoretic framework to preserve location information privacy in location-based service applications
MK Tefera, X Yang - Sensors, 2019 - mdpi.com
Recently, the growing ubiquity of location-based service (LBS) technology has increased the
likelihood of users' privacy breaches due to the exposure of their real-life information to …
likelihood of users' privacy breaches due to the exposure of their real-life information to …
[PDF][PDF] Security of personal medical data for the Redis concept
GI Muradova - Problems of information technology, 2018 - jpit.az
During processing personnel data, security is provided by personnel data protection system
which neutralizes actual treats. In the article, techniques and tools of Redis are oriented to …
which neutralizes actual treats. In the article, techniques and tools of Redis are oriented to …
Securing and hiding the destination of confidential medical information with domain fronting
G Muradova, M Hematyar - 2019 IEEE 13th International …, 2019 - ieeexplore.ieee.org
E-Health is a developed infrastructure, which usage becomes important to control access to
personal patients' data, as well as to various medical resources. The need for confidentiality …
personal patients' data, as well as to various medical resources. The need for confidentiality …
A valid and correct-by-construction formal specification of RBAC
Controlling access to data is one of the primary purposes of security, especially when it
comes to dealing with safety critical systems. In such systems, it is of paramount importance …
comes to dealing with safety critical systems. In such systems, it is of paramount importance …
[PDF][PDF] A comparative study to the semantics of ontology chain-based data access control versus conventional methods in healthcare applications
The necessity of having intelligent methodology to access databases in networks has
become more apparent in the age of distributed networks. Using semantics and ontologies …
become more apparent in the age of distributed networks. Using semantics and ontologies …
[PDF][PDF] Role-Based Access Control in SAS Programming: Enhancing Security and Authorization
To improve security and authorization protocols, this study investigates the application of
Role-Based Access Control (RBAC) in SAS (Statistical Analysis System) programming …
Role-Based Access Control (RBAC) in SAS (Statistical Analysis System) programming …
Development of conceptual foundations of medico-statistical data mining
G Muradova - 2018 IEEE 12th International Conference on …, 2018 - ieeexplore.ieee.org
The article defines concepts of the foundations of medico-statistical demographic data
mining. The mechanisms and tools of improvement of administration of population's …
mining. The mechanisms and tools of improvement of administration of population's …
[PDF][PDF] КОНЦЕПЦИЯ REDIS ДЛЯ ЗАЩИТЫ ПЕРСОНАЛЬНЫХ МЕДИЦИНСКИХ ДАННЫХ ПАЦИЕНТОВ
ГИ Мурадова - jpit.az
Безопасность персональных медицинских данных при их обработке в
информационной системе обеспечивается с помощью системы защиты персональных …
информационной системе обеспечивается с помощью системы защиты персональных …