Toward confidential distributed medical emergency system and security service
Medical Emergency System in the future would be a worldwide system which leads to private data that will be transmitted over network. Privacy is a strong requirement for systems dealing with personal medical data. A major factor of in the success of web service systems and many new software pro...
| Main Authors: | Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/9154/ http://irep.iium.edu.my/9154/1/Toward_confidential_distributed_medical_emergency_system_and_security_services.pdf |
Similar Items
Confidentiality to service medical emergency model
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Privacy in medical emergency system: cryptographic and security aspects
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
A model for ensuring data confidentiality: In healthcare and medical emergency
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Medical emergency and healthcare model: enhancemet with SMS and MMS facilities
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Enchancing QoS protection in MPLS networks
by: Hanshi, Sabri M., et al.
Published: (2010)
by: Hanshi, Sabri M., et al.
Published: (2010)
Integrated Medical Emergency Model: an interactive web-based database
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Dynamic traffic light sequence algorithm using RFID
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2008)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2008)
Dynamic traffic light sequence algorithm using RFID
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Implementation of Internet based remote control and monitoring
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2009)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2009)
The inviolability of medical confidentiality:an analysis of the rules and exceptions
by: Jahn Kassim, Puteri Nemie, et al.
Published: (2016)
by: Jahn Kassim, Puteri Nemie, et al.
Published: (2016)
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
Performance analysis of a free space optics link with multiple transmitters/receivers
by: Md Noor, Nur Haedzerin, et al.
Published: (2012)
by: Md Noor, Nur Haedzerin, et al.
Published: (2012)
Theoretical analysis of multiple transmitters/receivers on the performance of Free Space Optics (FSO) link
by: Md Noor, Nur Haedzerin, et al.
Published: (2011)
by: Md Noor, Nur Haedzerin, et al.
Published: (2011)
Mobile web for integrated medical emergency model
by: Hameed, Shihab A.
Published: (2010)
by: Hameed, Shihab A.
Published: (2010)
Confidentiality
by: Jahn Kassim, Puteri Nemie
Published: (2019)
by: Jahn Kassim, Puteri Nemie
Published: (2019)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Security performance of QKD
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
The inviolability of medical confidentiality in Malaysia: an analysis of the rules and exceptions
by: Jahn Kassim, Puteri Nemie, et al.
Published: (2016)
by: Jahn Kassim, Puteri Nemie, et al.
Published: (2016)
The Law Relating to Medical Confidentiality and Patient's Right of Privacy
by: Jahn Kassim, Puteri Nemie
Published: (2012)
by: Jahn Kassim, Puteri Nemie
Published: (2012)
MPLS and traffic engineering
by: Hassan, Abdallah, et al.
Published: (2011)
by: Hassan, Abdallah, et al.
Published: (2011)
Dual authentication for bluetooth connection
by: Saliou, Diallo Alhassane, et al.
Published: (2014)
by: Saliou, Diallo Alhassane, et al.
Published: (2014)
Practical considerations on Quantum Key Distribution (QKD)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
Effects of rain on free space optical propagation
by: Ahmad Zabidi, Suriza, et al.
Published: (2011)
by: Ahmad Zabidi, Suriza, et al.
Published: (2011)
Preliminary analysis on the effect of rain attenuation on Free Space Optics (FSO) propagation measured in tropical weather condition
by: Ahmad Zabidi, Suriza, et al.
Published: (2011)
by: Ahmad Zabidi, Suriza, et al.
Published: (2011)
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Wireless technology to secure emergency and guidance
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Secure scheme for user authentication and authorization in android environment
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
SMS and MMS to enhance an integrated medical emergency model for malaysia
by: Hameed, Shihab A.
Published: (2010)
by: Hameed, Shihab A.
Published: (2010)
Challenges in online secure authentication and authorization methodology: a review
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Design and performance analysis of VCO for standard GSM using MEMS
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Research direction in mobile IPV6
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
HMIPV6 based approaches for mobility management
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Emergency nurses readiness towards providing emergency medical services
by: Nurumal, Mohd. Said, et al.
Published: (2017)
by: Nurumal, Mohd. Said, et al.
Published: (2017)
FPGA control of quantum channel security
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Medical ethics in the light of maqāṣid al-Sharīʿah: a case study of medical confidentiality
by: Ghalia, Bouhedda, et al.
Published: (2018)
by: Ghalia, Bouhedda, et al.
Published: (2018)
Free space optic communications – a review of quality parameters
by: Alma, Husagic, et al.
Published: (2011)
by: Alma, Husagic, et al.
Published: (2011)
Performance evaluation of Free-Space-Optic (FSO) links
by: Alma, Husagic, et al.
Published: (2011)
by: Alma, Husagic, et al.
Published: (2011)
Quantum key distribution protocols
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
A novel mobile web application for an integrated medical and emergency model
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Similar Items
-
Confidentiality to service medical emergency model
by: Hameed, Shihab A., et al.
Published: (2011) -
Privacy in medical emergency system: cryptographic and security aspects
by: Hameed, Shihab A., et al.
Published: (2010) -
A model for ensuring data confidentiality: In healthcare and medical emergency
by: Hameed, Shihab A., et al.
Published: (2011) -
Medical emergency and healthcare model: enhancemet with SMS and MMS facilities
by: Hameed, Shihab A., et al.
Published: (2010) -
Enchancing QoS protection in MPLS networks
by: Hanshi, Sabri M., et al.
Published: (2010)