Author:
Greene Emily,Proctor Patrick,Kotz David
Funder
National Science Foundation
Subject
Health Information Management,Computer Science Applications,Health Informatics,Information Systems,Medicine (miscellaneous)
Reference26 articles.
1. Akinyele, J.A., Lehmann, C.U., Green, M.D., Pagano, M.W., Peterson, Z.N. J., & Rubin, A.D. (2010). Self-protecting electronic medical records using attribute-based encryption. Tech. Rep. 2010/565, Cryptology ePrint Archive. URL 〈http://eprint.iacr.org/2010/565〉.
2. Ambrosin, M., Conti, M., & Dargahi, T. (2015). On the feasibility of attribute-based encryption on smartphone devices. In Proceedings of the Workshop on IoT Challenges in Mobile and Industrial Systems (IoT-Sys), pp. 49–54. ACM. URL 〈http://dx.doi.org/10.1145/2753476.2753482〉.
3. Benaloh, J., Chase, M., Horvitz, E., & Lauter, K. (2009). Patient controlled encryption: ensuring privacy of electronic medical records. In Proceedings of the ACM Workshop on Cloud Computing Security (CCSW), pp. 103–114. ACM. URL 〈http://dx.doi.org/10.1145/1655008.1655024〉.
4. Patients want granular privacy control over health information in electronic medical records;Caine;Journal of the American Medical Informatics Association,2013
5. Caine, K., Kohn, S., Lawrence, C., Hanania, R., Meslin, E., & Tierney, W. (2015). Designing a patient-centered user interface for access decisions about ehr data: Implications from patient interviews. 30 (1), 7-16. URL 〈http://dx.doi.org/10.1007/s11606-014-3049-9〉.
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献