A framework of authentication and authorization for e-health services
This article introduces a framework for authentication and authorization in e-health services. It aims to build the architecture for authentication and authorization within an e-health service system. The architecture will help to build a secure and privacy protection e-health service system. The un...
| Main Authors: | Han, Song, Skinner, Geoffrey, Potdar, Vidyasagar, Chang, Elizabeth |
|---|---|
| Format: | Conference Paper |
| Published: |
ACM
2006
|
| Subjects: | |
| Online Access: | http://portal.acm.org/toc.cfm?id=1180367&type=proceeding&coll=ACM&dl=ACM&CFID=18358019&CFTOKEN=97622040 http://hdl.handle.net/20.500.11937/36958 |
Similar Items
New framework for authentication and authorization for e-health service systems
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Use of ontology technology for standardization of medical records and dealing with associated privacy issues
by: Hadzic, Maja, et al.
Published: (2006)
by: Hadzic, Maja, et al.
Published: (2006)
Integration of situational and reward elements for fair privacy principles and preferences (F3P)
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006)
by: Wu, Chen, et al.
Published: (2006)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Visualisation of electronic health records
by: Wang, Qiru
Published: (2025)
by: Wang, Qiru
Published: (2025)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A framework of privacy shield in organizational information systems
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Evaluation of community pharmacy electronic patient medication record systems’ functionality focusing on safety features and alerts
by: Ojeleye, Oluwagbemileke Oluwabukade
Published: (2015)
by: Ojeleye, Oluwagbemileke Oluwabukade
Published: (2015)
PP-SDLC The privacy protecting systems development life cycle
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Musical stage theory: a novel account for the ontology of musical works and the authenticity of music
by: Moruzzi, Caterina
Published: (2018)
by: Moruzzi, Caterina
Published: (2018)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Privacy and the Health Industry
by: Carew-Reid, Anne
Published: (2003)
by: Carew-Reid, Anne
Published: (2003)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Developing Authentic and Virtual E-Learning Environments
by: Veenendaal, Bert, et al.
Published: (2005)
by: Veenendaal, Bert, et al.
Published: (2005)
An introduction to a taxonomy of information privacy in collaborative environments
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Contesting authentic practice and ethical authority in adventure tourism
by: Rickly, J.M., et al.
Published: (2017)
by: Rickly, J.M., et al.
Published: (2017)
A projection of the future effects of quantum computation on information privacy and information security
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Understanding the challenges of using personal data in media experiences
by: Sailaja, Neelima
Published: (2020)
by: Sailaja, Neelima
Published: (2020)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
Incongruity between pedagogy of authenticity and contemporary educational apparatus: person-centred phenomenological studies
by: Plust, Urszula
Published: (2023)
by: Plust, Urszula
Published: (2023)
Researching the transparency of personal data sharing: designing a concert receipt
by: Styliari, Tatiana C., et al.
Published: (2016)
by: Styliari, Tatiana C., et al.
Published: (2016)
Privacy-preserving record linkage on large real world datasets
by: Randall, Sean, et al.
Published: (2014)
by: Randall, Sean, et al.
Published: (2014)
An evaluation framework for comparing geocoding systems
by: Goldberg, D., et al.
Published: (2013)
by: Goldberg, D., et al.
Published: (2013)
The politics of protest in newspaper campaigns:
dissent, populism and the rhetoric of authenticity
by: Birks, Jen
Published: (2011)
by: Birks, Jen
Published: (2011)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Secure electronic commerce with mobile agents
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Secure lightweight client for cloud-based E-Health Model
by: Zhang, Xiaowei
Published: (2023)
by: Zhang, Xiaowei
Published: (2023)
Privacy preserving for electronic health record systems
by: Yussuf, Zakariye Mohamed
Published: (2019)
by: Yussuf, Zakariye Mohamed
Published: (2019)
The effect of data cleaning on record linkage quality
by: Randall, Sean, et al.
Published: (2013)
by: Randall, Sean, et al.
Published: (2013)
Distributed authentication for the Western Australian University Libraries
by: Green, Peter
Published: (2004)
by: Green, Peter
Published: (2004)
The fantasy of authenticity: touring with Lacan
by: Knudsen, Daniel C., et al.
Published: (2016)
by: Knudsen, Daniel C., et al.
Published: (2016)
Enabling the new economic actor: data protection, the digital economy, and the databox
by: Crabtree, Andy, et al.
Published: (2016)
by: Crabtree, Andy, et al.
Published: (2016)
A Distributed Authentication Infrastructure for Western Australian Universities
by: Green, Peter, et al.
Published: (2003)
by: Green, Peter, et al.
Published: (2003)
Similar Items
-
New framework for authentication and authorization for e-health service systems
by: Han, Song, et al.
Published: (2006) -
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006) -
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007) -
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006) -
Use of ontology technology for standardization of medical records and dealing with associated privacy issues
by: Hadzic, Maja, et al.
Published: (2006)