A systematic literature review on security and privacy of electronic health record systems: technical perspectives

F Rezaeibagha, KT Win… - Health Information …, 2015 - journals.sagepub.com
Background: Even though many safeguards and policies for electronic health record (EHR)
security have been implemented, barriers to the privacy and security protection of EHR …

A review of privacy and consent management in healthcare: A focus on emerging data sources

MR Asghar, TH Lee, MM Baig, E Ullah… - 2017 IEEE 13th …, 2017 - ieeexplore.ieee.org
The emergence of New Data Sources (NDS) in healthcare is revolutionising traditional
electronic health records in terms of data availability, storage, and access. Increasingly …

Health information system in a cloud computing context

F Sadoughi, L Erfannia - Health Informatics Meets eHealth, 2017 - ebooks.iospress.nl
Healthcare as a worldwide industry is experiencing a period of growth based on health
information technology. The capabilities of cloud systems make it as an option to develop …

Multi-authority security framework for scalable EHR systems

F Rezaeibagha, Y Mu, W Susilo… - International Journal of …, 2016 - inderscienceonline.com
Electronic health record (EHR) systems can be operated in a large-scale distributed
environment, such as cloud computing, which might have to be managed by multiple …

Real-time output tracking for induction motors by recurrent high-order neural network control

AY Alanis, EN Sanchez… - 2009 17th Mediterranean …, 2009 - ieeexplore.ieee.org
This paper deals with the discrete-time adaptive output trajectory tracking for induction
motors in presence of bounded disturbances. A recurrent high order neural network …

A facial-skin condition classification system using texture and fuzzy c-means technologies

Y Chen, L Liu, C Huang - Fourth International Conference on …, 2007 - ieeexplore.ieee.org
This paper describes a facial-skin condition classification system based on cosmeticians'
suggestions to let the users realize their facial-skin conditions. Two kinds of features are …

An access control model for cloud-based emr federation

AV Nimkar, SK Ghosh - International Journal of Trust …, 2014 - inderscienceonline.com
Pharmaceutical companies and researchers need a huge collection of health records for an
epidemiological study where spread and control of diseases are investigated. Huge …

Automatic Tampering Detection Paradigm to Support Personal Health Record

A Razaque, FH Amsaad, M Abdulgader… - 2016 IEEE First …, 2016 - ieeexplore.ieee.org
In this paper, we introduce automatic tampering detection (ATD) paradigm to support the
personal health record (PHR). The personal health record (PHR) is an emerging model of …

Cheating resistant implicit security

A Parakh - 2015 IEEE 14th International Symposium on …, 2015 - ieeexplore.ieee.org
This paper discusses an implicit security algorithm for secure transmission using multiple
paths between sender and receiver, secure cloud storage, in a peer-to-peer network and …

Caucus: an authentication protocol for cloud federation

AV Nimkar, SK Ghosh - International Journal of Trust …, 2018 - inderscienceonline.com
Cloud federation provides computing services of internal and external cloud providers.
These computing services (eg, virtual resources or services etc.) are collectively owned …