Proceedings of the 3d International ICST Conference on Pervasive Computing Technologies for Healthcare 2009
DOI: 10.4108/icst.pervasivehealth2009.5969
|View full text |Cite
|
Sign up to set email alerts
|

Secure healthcare information exchange for local domains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2011
2011
2013
2013

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…This protocol is often adopted to secure a wide number of Internet applications for instance email applications, credit card transactions and any other exchanges of sensitive data [4]. TLS uses cryptography to achieve main security functionalities such as confidentiality, authentication, integrity and privacy.…”
Section: Transport Layer Security (Tls)mentioning
confidence: 99%
See 2 more Smart Citations
“…This protocol is often adopted to secure a wide number of Internet applications for instance email applications, credit card transactions and any other exchanges of sensitive data [4]. TLS uses cryptography to achieve main security functionalities such as confidentiality, authentication, integrity and privacy.…”
Section: Transport Layer Security (Tls)mentioning
confidence: 99%
“…S/MIME has been used in several commercial health care networks for communication of medical documents in the form of cryptographically signed S/MIME email messages [3]. S/MIME is one of the standards that is also used to ensure the compliancy and scalability options are being met while securing transactions services for wired and wireless devices [4]. Some attentions to adopt these protocols in healthcare area is developed by the security model to secure the EMR transactions [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation