Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication 2011
DOI: 10.1145/1968613.1968645
|View full text |Cite
|
Sign up to set email alerts
|

Managing security and privacy in ubiquitous eHealth information interchange

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
10

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(16 citation statements)
references
References 15 publications
0
6
0
10
Order By: Relevance
“…Studies also raise privacy concerns when using healthcare data [23][24][25]. Research to date presents different approaches to tackle these concerns; for instance, a proposed framework for deriving security and privacy requirements [24]. Other solutions propose protocols to enable anonymous data exchange between stakeholders in cloud environments [25].…”
Section: Related Workmentioning
confidence: 99%
“…Studies also raise privacy concerns when using healthcare data [23][24][25]. Research to date presents different approaches to tackle these concerns; for instance, a proposed framework for deriving security and privacy requirements [24]. Other solutions propose protocols to enable anonymous data exchange between stakeholders in cloud environments [25].…”
Section: Related Workmentioning
confidence: 99%
“…Other privacy engineering frameworks, including the model presented in NISTIR 8062 are also under consideration [28], [116]- [119].…”
Section: Security and Privacy Fabric Principlesmentioning
confidence: 99%
“…Other privacy engineering frameworks, including the model presented in NISTIR 8062 are also under consideration. [30], [101]- [104] Related principles include identity management frameworks such as proposed in the National Strategy for Trusted Identities in Cyberspace (NSTIC) [105] and considered in the NIST Cloud Computing Security Reference Architecture. [106] Aspects of identity management that contribute to a security and privacy fabric will be addressed in future versions of this document.…”
Section: Security and Privacy Fabric Principlesmentioning
confidence: 99%