A security framework for nationwide health information exchange based on telehealth strategy

BB Zaidan, A Haiqi, AA Zaidan, M Abdulnabi… - Journal of medical …, 2015 - Springer
This study focuses on the situation of health information exchange (HIE) in the context of a
nationwide network. It aims to create a security framework that can be implemented to …

Effect of structural factor on the electropolymerization of bithiophenic precursors containing a 3, 4-ethylenedisulfanylthiophene unit

M Turbiez, P Frère, M Allain, N Gallego-Planas… - …, 2005 - ACS Publications
A series of bithiophenes based on bis (3, 4-alkylenedisulfanylthiophene) and hybrid systems
associating 3, 4-ethylenedisulfanylthiophene (EDST) with thiophene or 3, 4 …

A secure operational model for mobile payments

TK Chang - The Scientific World Journal, 2014 - Wiley Online Library
Instead of paying by cash, check, or credit cards, customers can now also use their mobile
devices to pay for a wide range of services and both digital and physical goods. However …

Model-driven trust negotiation for web services

H Skogsrud, B Benatallah, F Casati - IEEE Internet Computing, 2003 - ieeexplore.ieee.org
Trust negotiation is an approach to access control whereby access is granted based on trust
established in a negotiation between the service requester and the service provider. Trust …

Trust network-based filtering of aggregated claims

J Golbeck, B Parsia - International Journal of Metadata …, 2006 - inderscienceonline.com
On the semantic web, assertions may be aggregated from many sources, those
aggregations filtered, reasoned over, aggregated with other aggregators, displayed …

Mechanisms for increasing the usability of grid security

B Beckles, V Welch, J Basney - International Journal of Human-Computer …, 2005 - Elsevier
Grid security is based on public key infrastructure (PKI), an architecture that offers strong
security for inter-institutional projects, making it ideal for computational grids. However …

[DOC][DOC] Assertions and protocol for the oasis security assertion markup language (saml)

P Hallam-Baker, E Maler - OASIS XML-Based Security Services …, 2002 - oasis-open.org
Security Assertions Markup Language Assertions and Protocol for the OASIS Security
Assertion Markup Language (SAML) Document identifier: draft-sstc-core-32 Location: http://www.oasis-open.org/committees/security/docs …

Security patterns and requirements for internet‐based applications

DG Rosado, C Gutiérrez, E Fernández‐Medina… - Internet …, 2006 - emerald.com
Purpose–The purpose of this paper is that of linking security requirements for web services
with security patterns, both at the architectural and the design level, obtaining in a systematic …

Public key infrastructures that satisfy security goals

WT Polk, NE Hastings, A Malpani - IEEE Internet Computing, 2003 - search.proquest.com
The architecture chosen for a public key infrastructure (PKI) determines the scalability and
usability experienced by PKI users. Enterprise PKIs typically consist of a single certificate …

Designing a distributed access control processor for network services on the web

R Kraft - Proceedings of the 2002 ACM Workshop on XML …, 2002 - dl.acm.org
The service oriented architecture (SOA) is gaining more momentum with the advent of
network services on the Web. A programmable and machine accessible Web is the vision of …