Bibliography on Secure E-Healthcare Systems    

 

 

Maintained by

Mrinmoy Barua, Rongxing Lu, and Xiaohui Liang

Supported by

Prof. Xuemin (Sherman) Shen and Prof. Xiaodong Lin

Broadband Communications Research (BBCR) Group

Department of Electrical and Computer Engineering

University of Waterloo, Waterloo, Ontario, Canada


Recently, the expeditious development of wireless networks has led to the emergency of a new type of e-healthcare system, providing expert-based medical treatment remotely on time. With the e-healthcare system, wearable sensors and portable wireless devices can automatically monitor individuals' health status and forward them to the hospitals, doctors and related people. The system offers great conveniences to both patients and health care providers. For the patients, the foremost advantage is to reduce the waiting time of diagnosis and medical treatment, since they can deliver the emergent accident information to their doctors even if they are far away from the hospital or they don't notice their health condition. In addition, e-health system causes little interruption to patients' daily activities. For the health care providers, after receiving the abnormal signals from the patients, appropriate treatment can be made, which saves medical resources. Furthermore, without direct contact with medical facilities, medical personnel or other patients, the patients are unlikely to be infected with other diseases.

However, to ensure the security and privacy of patients' medical records encounters a lot of challenges: how to achieve the confidentiality and integrity of patients' information, the security of wireless body area network, the privacy and unlink ability of patients' health status, the undeniability and unlinkability of doctors' treatment, the location privacy of patients, the fine-grained access control of patients' medical record, the mutual authentication between patients and hospitals, etc.

It would be useful to create an up-to-date bibliography on secure e-healthcare systems.

In general, we are including literatures in English, which are published in conference proceedings, journals, and some unpublished technical reports or dissertations. We would appreciate if any error in this list, as well as any literatures that should be added are notified.

Acknowledgements: Many thanks to Le Chen, Jianqiao Shao, Daniel Slamanig and Bin Liu for their valuable contributions to this website.

WWW    

  Healthcare Conferences
  • BodyNet [2006] [2007] [2008] [2009] [2010][2011]
  • HealthNet [2007] [2008]
  • HealthCom [2008][2009] [2010][2011][2012]
  • AHIC [2010][2011][2012]
  • USENIX Workshop on Health Security and Privacy (HealthSec) [2010][2011][2012]
  • ACM workshop on Security and privacy in medical and home-care systems (SPIMACS) [2010]
  • COMSNETs Workshop on Networked Healthcare Technology [2011]
  • ACM International Health Informatics Symposium, IHI [2010]
  • International Conference on Health Informatics, HEALTHINF [2011]
  • International ICST Conference on Wireless Mobile Communication and Healthcare, MobiHealth [2010]
  • International Workshop on Ubiquitous Healthcare and Application, UHA [2011]
  • International ICST Conference on Electronic Healthcare for the 21st century, eHealth [2011]
  • International Conference on eHealth, Telemedicine, and Social Medicine, eTELEMED [2011]
  • Symposium on Selected Areas in Communications - eHealth Track, SAC-EH [2011]
  • International Conference of the European Federation for Medical Informatics, MIE [2011]
  • International ICST Conference on Pervasive Computing Technologies for Healthcare, PERVASIVE HEALTH [2011]


  Healthcare Journals
 


  Bibliography on Secure E-Healthcare Systems
[News|Big Data|2013|2012|2011|Selected|2009|2008|2007|2006|2005--Before]

 


  • Platform
  • Health Information Management Systems and Society. HIMSS analytics database. Online at http: //www.himssanalytics.org/data/HADB.aspx. Last accessed January 27, 2013.
  • Capsule.Medical device connectivity, medical device integration, 2012. Online; accessed January 23, 2013, Online at http://www.capsuletech.com.
  • Nike+ FuelBand. Online at http://www.nike.com/us/en us/lp/nikeplusfuelband, visited Novem- ber 2012.
  • UP by Jawbone. Online at https://jawbone.com/up, visited November 2012.
  • Medminder Inc. MedMinder, 2012. Online; accessed January 27, 2013, Online at http://www. medminder.com.
  • Cerner. Cerner medical devices. http://www.cerner.com/solutions/Medical Devices, 2012. Online; accessed January 23, 2013.
  • Numera. Numera net. Online at http://numera.com/numera-net. Last accessed January 27, 2013.
  • Qualcomm. The 2net platform. Online at http://www.qualcommlife.com/wireless-health. Last accessed January 27, 2013.
  • VITALITY Inc. Vitality, 2010. Online; accessed January 27, 2013, Online at http://www.vitality.net.
  • Embedded Wireless. Zilant wellness platform. Online at http://embeddedwireless.com. Last ac- cessed January 27, 2013.
  • Statistics
  • Aruba Networks, Inc. 2012 healthcare mobility trends survey results., February 2012. Last accessed January 26, 2013, Online at
  • http://www.arubanetworks.com/pdf/solutions/HIMSSSurvey 2012. pdf.
  • America’s New Mobile Majority: a Look at Smartphone Owners in the U.S. Online at http://blog.nielsen.com/nielsenwire/?p=31688, May 2012. Last accessed January 27, 2013.
  • WHO: World Health Organization. World health statistics 2011, 2012. Last accessed January 26, 2013, Online at http://www.who.int/gho/publications/world health statistics/EN WHS2011 Full.pdf.
  • Security
  • NG Leveson and CS Turner. An investigation of the Therac-25 accidents. Computer, 26(7):18 –41, July 1993.
  • Nosy employees are a risk, require a wide range of remedies. Report on Patient Privacy, 5(8), August 2005.
  • Review — what they know: A Wall Street Journal Investigation: Your Apps Are Watching You — A Journal investigation finds that iPhone and Android apps are breaching the privacy of smartphone users, December 2010.
  • C. A. Gunter, and David Liebovitz. Role prediction using electronic medical record system audits. AMIA Annual ldots, 2011. Online at http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3243238/.
  • David Talbot. Computer viruses are “rampant” on medical devices in hospitals. http: //www.technologyreview.com/news/429616/computer-viruses-are-rampant-on-medical- devices-in-hospitals/, Oct 2012.
  • Comtrol. Electronic medical records (EMR) system and medical devices integration, 2012. Online; accessed January 23, 2013, Online at http://www.comtrol.com/pub/en/Comtrol-s-DeviceMaster- RTS-is-bridging-the-gap-between-medical-devices-and-EMR-systems.
    The Economist. The leaky corporation. Online at http://www.economist.com/node/18226961? story id=18226961, February 2011. Last accessed January 27, 2013.
  • Juanita Fernando. The elephant in the room: Health information system security and the user-level environment. In International Conference for Internet Technology and Secured Transactions, pages 1–7, November 2009. Online at http://ieeexplore.ieee.org/xpls/abs all.jsp?arnumber=5402503.
  • Health-care sector vulnerable to hackers, researchers say. Online at
    http://articles.washingtonpost.com/2012-12-25/news/36015727 1 health-care-medical-devices- patient-care, December 2012. Last accessed January 26, 2013.
  • LLC. Ponemon Institute. Third annual benchmark study on patient privacy & data security. Online at http://www.ponemon.org/local/upload/file/Third Annual Study Patient Privacy FINAL5.pdf, December 2012. Last accessed January 26, 2013.
  • Jennifer Valentino-DeVries. Why are health data leaking online? bad software, study says. Online at http://blogs.wsj.com/digits/2011/01/03/why-are-health-data-leaking-online- bad-software-study-says/, January 2011. Last accessed January 27, 2013.
  • Joint NEMA/COCIR/JIRA Security and Privacy Committee (SPC). Break-glass – An approach to granting emergency access to healthcare systems, December 2004. On- line at http://www.medicalimaging.org/wp-content/uploads/2011/02/Break-Glass-Emergency Access to Healthcare Systems.pdf.
  • M. Eric Johnson. The Economics of Financial and Medical Identity Theft.
  • Health IT The Next Bubble and How Long Will It Take to Pop–Probably When The Money Runs Out, http://ducknetweb.blogspot.com/2010/12/health-it-next-bubble-and-how-long-will.html
  •  M. Eric Johnson. Managing information access in data-rich enterprises with escalation and incentives. International Journal of Electronic Commerce, 15(1):79–111, October 2010. Online at http://www.ijec-web.org/past-issues/volume-15-number-1-fall-2010/managing- information-access-in-data-rich-enterprises-with-escalation-and-incentives/.
  • Genome
  • Identifiability in biobanks: models, measures, and mitigation strategies. Human Genetics, 130:383–392, 2011.
  • PersonalGenomes.org. Personal genome project. Last accessed January 27, 2013, Online at http: //www.personalgenomes.org.
  • Identifying personal genomes by surname inference. Science, 339(321), 2013.
  • Behavior
  • CAIDA: Visualizing the internet. Internet Computing Online, page 88, January 2001.
  • Technical Report. Technical report, Cooperative Association for Internet Data Analysis (CAIDA), Jul 2004.
  • Medication compliance, adherence, and persistence: Current status of behavioural and educational interventions to improve outcomes. Supplement to Journal of Managed Care Pharmacy, 14(6):S2–S10, August 2008.
  • Strategies
  • CardiacScience. Heartcentrix device connectivity solution, 2012. Online; accessed Jan- uary 23, 2013, Online at http://www.cardiacscience.com/cardiology-products/data-management- and-connectivity/heartcentrix-cardiac-data-management-connectivity.php.
  • Improving quality and reducing costs in health care: Engaging consumers using electronic tools. Online at http://bipartisanpolicy.org/sites/default/files/BPC Engaging Consumers Using Electronic Tools.pdf, December 2012. Last accessed January 26, 2013.
  • An unhealthy america: The economic burden of chronic disease. Milken Institute, Santa Monica, CA, 2007. Last accessed Jan- uary 26, 2013, Online at http://www.milkeninstitute.org/publications/publications.taf?function= detail&ID=38801018&cat=ResRep.
  • Mobile & Cloud
  • research2guidance. Mobile health market report 2011-2016: The impact of smartphone applications on the mobile health industry (vol. 2). Online at http://www.research2guidance.com/shop/index. php/mhealth-report-1, January 2012
  • Tablet use nearly doubles among doctors since 2011: Report. Online at http://www.eweek.com/c/a/Health-Care-IT/Tablet-Use-Nearly-Doubles-Among-Doctors- Since-2011-Report-177298/, May 2012. Last accessed January 27, 2013.
  • 5 great health apps you should download now. Online at http://healthland. time.com/2012/08/16/5-great-health-apps-you-should-use-now/, August 2012. Last accessed January 26, 2013.
  • 5 Advantages of a Cloud-Based EHR for Small Practices. Online at http://www. poweryourpractice.com/5-advantages-of-a-cloud-based-ehr-for-small-practices/, January 2012. Last accessed January 26, 2013.
  • Research by Companies
  • WalMart plans to market digital health records system, March 2009. Last accessed January 26, 2013, Online at http://www.nytimes.com/2009/03/11/business/11record.html.
  • AT&T. Look ahead: Top five healthcare IT trends for 2013, December 2012. Online; accessed January 23, 2013, Online at http://www.att.com/gen/press-room?pid=23593&cdvn= news&newsarticleid=35785.
  • Research by Institue
  • National eHealth Collaborative. Liberating data and fostering innovation to engage patients.Online at http://www.nationalehealth.org/LiberatingData, January 2013
  • The University of Chicago Department of Medicine. DOM iPad Initiative Increases Resident Productivity. Online at http://medicine.uchicago.edu/about/ipad.html, February 2011. Last accessed January 27, 2013.
  • The Institute of Medicine of The National Academies. Best care at lower cost: The path to continuously learning health care in america. Online at http://www.iom.edu/Reports/2012/Best-Care-at- Lower-Cost-The-Path-to-Continuously-Learning-Health-Care-in-America.aspx, September 2012. Last accessed January 26, 2013.

  • [ICSH13] H. Chen, S. Compton, and O. Hsiao, "DiabeticLink: A Health Big Data System for Patient Empowerment and Personalized Healthcare", Smart Health – International Conference, ICSH 2013.
  • [KDD13] V. Chandola, S. R. Sukumar, and J. Schryver, "Knowledge Discovery from Massive Healthcare Claims Data," Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD’ 13), 2013.
  • [CD13] N. V. Chawla, D. A. Davis, “Bringing Big Data to Personalized Healthcare: A Patient-Centered Framework”, J Gen Intern Med, Vol. 28(3), pp. 660-665, Jun. 2013.
  • [NGMAST12] A. Mukherjee, A. Pal, and P. Misra, "Data Analytics in Ubiquitous Sensor-based Health Information Systems," Next Generation Mobile Applications, Service and Technologies (NGMAST), 2012 6th International Conference On, 2012.
  • [GZW11] B. Guo, D. Zhang, and Z. Wang, “Living with Internet of Things: The Emergence of Embedded Intelligence,” in 4th International Conference on Cyber, Physical and Social Computing, 2011.
  • [PG11] F. Paganelli and D. Giuli, “An Ontology-Based System for Context-Aware and Configurable Services to Support Home-Based Continuous Care,” IEEE Transactions on Information Technology in Biomedicine, vol. 15, no. 2, pp. 324–333, 2011.
  • [D10] A. Dohr, R. Modre-Opsrian, and M. D. et. al., “The Internet of Things for Ambient Assisted Living,” in 7th International Conference on Information Technology: New Generations, 2010.
  • [B10] M. Blount, M. R. Ebling, and J. M. E. et. al., “Real-Time Analysis for Intensive Care: Development and Deployment of the Artemis Analytic System,” Engineering in Medicine and Biology Magazine, vol. 29, no. 2, pp. 110–118, 2010.
  • [S10] S. Jimeng, D. Sow, and J. Hu, et. al., “A System for Mining Temporal Physiological Data Streams for Advanced Prognostic Decision Support,” in 10th International Conference on Data Mining, 2010
  • [A09] A. D’Andrea, A. D’Ulizia, and F. F. et. al., “A Multimodal Pervasive Framework for Ambient Assisted Living,” in 2nd International Conference on PErvasive Technologies Related to Assistive Environments, 2009.
  • [C07] R. Costa, J. Neves, and P. N. et. al., “Intelligent Mixed Reality for the Creation of Ambient Assisted Living,” in 13th Portuguese Conference on Progress in Artificial Intelligence, 2007.
  • [KD07] N. Kara and O. A. Dragoi, “Reasoning with Contextual Data in teleHealth Applications,” in 3rd International Conference on Wireless and Mobile Computing, Networking and Communications, 2007.
  • [HRP06] H. Han, H. C. Ryoo, and H. Patrick, “An Infrastructure of Stream Data Mining, Fusion and Management for Monitored Patients,” in 19th International Symposium on Computer-Based Medical Systems, 2006.

  • [RCCY13] Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, and Jie Yang, "Smartphone Based User Verification Leveraging Gait Recognition For Mobile Healthcare Systems," IEEE SECON 2013.
  • [BLLS13] M. Barua, X. Liang, R. Lu, and X. Shen, "RCare: Extending Secure Health Care to Rural Area Using VANETs," Mobile Networks and Applications (MONET), 2013.
  • [LLBCLSL13] X. Liang, X. Li, M. Barua, L. Chen, R. Lu, X. Shen, and H. Y. Luo, "Enable Pervasive Healthcare through Continuous Remote Health Monitoring," IEEE Wireless Communications, 2013.
  • [SYYL13] L. Shi, J. Yuan, S. Yu, and M. Li, "ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks," WiSec 2013.
  • [LYGLR13] Ming Li, Shucheng Yu, Joshua D. Guttman, Wenjing Lou and Kui Ren, "Secure Ad-Hoc Trust Initialization and Key Management in Wireless Body Area Networks," ACM Transactions on Sensor Networks (TOSN), 2013.

  • [RCC12] Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, "Social Closeness Based Clone Attack Detection for Mobile Healthcare System," IEEE MASS 2012.
  • [HBT12] L. Hoffman, D. Burley, C. Toregas, "Holistically Building the Cybersecurity Workforce," IEEE Security & Privacy, Vol. 10, No. 2, 2012.
  • [ZWVF12] Z. Zhang, H. Wang, A. V. Vasilakos, and H. Fang, "ECG-Cryptography and Authentication in Body Area Networks," IEEE Transactions on Information Technology in Biomedicine, Vol. 16, No. 6, November 2012.
  • [HCCBV12] D. He, C. Chen, S. Chan, J. Bu, and A. V. Vasilakos, "A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks," IEEE Transactions on Information Technology in Biomedicine, Vol. 16, No. 6, November 2012.
  • [LLSLLSZ12] X. Liang, X. Li, Q. Shen, R. Lu, X. Lin, X. Shen, and W. Zhuang, "Exploiting Prediction to Enable Secure and Reliable Routing in Wireless Body Area Networks," Proc. IEEE INFOCOM'12, March 2012.
  • [LLLLS12] X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, "Enabling Pervasive Healthcare with Privacy Preservation in Smart Community," In Proc. IEEE ICC 2012.
  • [LBLLS12] X. Liang, M. Barua, R. Lu, X. Lin, and X. Shen , "HealthShare: Achieving Secure and Privacy-preserving Health Information Sharing through Health Social Networks," Computer Communications - special issue on Smart and Interactive Ubiquitous Multimedia Services, 2012.
  • [SLYY12] L. Shi, M. Li, S. Yu, and J. Yuan, "BANA: Body Area Network Authentication Exploiting Channel Characteristics," ACM WiSec, Tucson, AZ, Apr. 2012.
  • [LYGLR12] M. Li, S. Yu, J. D. Guttman, W. Lou and K. Ren, "Secure Ad-Hoc Trust Initialization and Key Management in Wireless Body Area Networks," ACM Transactions on Sensor Networks (TOSN), 2012.
  • [LYZRL12] M. Li, S. Yu, Y. Zheng, K. Ren and W. Lou, "Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption,'' IEEE Transactions on Parallel and Distributed Systems (TPDS), 2012.

  • [RYCC11] Yanzhi Ren, Jie Yang, Mooi Choo Chuah, and Yingying Chen, "Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare," IEEE MASS 2011.
  • [GHRKF11] S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices," In Proceedings of ACM SIGCOMM. August 2011. Best paper award.
  • [LBLS11] X. Liang , M. Barua, R. Lu, and X. Shen , "Privacy-preserving Wireless Data Transmission for e-Healthcare Applications", IEEE COMSOC MMTC E-Letter - TECHNOLOGY ADVANCE COLUMN on Multimedia Communications for Ubiquitous Healthcare, Vol. 6, No. 11, pp. 39-41, 2011.
  • [BLLS11] M. Barua, X. Liang, R. Lu, and X. Shen , "ESPAC: Enabling Security and Patient-centric Access Control for eHealth in Cloud Computing", Int. J. of Security and Networks (IJSN). Vol. 6, Nos. 2/3, pp. 67-76, 2011.
  • [LLCLS11] X. Liang, R. Lu, L. Chen, X. Lin, and X. Shen , "PEC: A Privacy-preserving Emergency Call Scheme for Mobile Healthcare Social Networks ", IEEE/KICS J. Commu. and Networks (JCN), Vol. 13, No. 2, pp. 102-112, 2011.
  • [BLLS11] M. Barua, X. Liang , R. Lu, and X. Shen, "PEACE: An Efficient and Secure Patient-centric Access Control Scheme for eHealth Care System," Proc. IEEE INFOCOM'11-SCNC , Shanghai, China, April 10-15, 2011.
  • [BALS11] M. Barua, M. S. Alam, X. Liang , and X. Shen, "Secure and Quality of Service Assurance Scheduling Scheme for WBAN with Application to eHealth", Proc. IEEE WCNC 2011 , Cancun, Quintana-Roo, Mexico, March 28-31, 2011.
  • [HSS11] X. Huang, H. Shan, and X. Shen, "On Energy Efficiency of Cooperative Communications in Wireless Body Area Networks", Proc. IEEE WCNC'11, Cancun, Quintana-Roo, Mexico, March 28-31, 2011.
  • [LLLS11] R. Lu, X. Lin, X. Liang, and X. Shen , " A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network ", ACM Mobile Networks and Applications (MONET), Vol. 16, Issue 6, pp. 683-694, 2011.
  • [ALUK11] M.A. Ameen, J. Liu, S. Ullah, and K. S. Kwak, "A power efficient MAC protocol for implant device communication in Wireless Body Area Networks," CCNC 2011.
  • [APQC11] M. Asim, M. Petkovic, M. Qu, and C. Wang, "An interoperable security framework for connectedhealthcare," CCNC 2011.
  • [CRRR11] J. Calvillo, I. Roma?n, S. Rivas, andL.M. Roa, "Privilege Management Infrastructure for Virtual Organizations in Healthcare Grids," Information Technology in Biomedicine, IEEE Transactions on, Page(s): 316 - 323, 2011.
  • [GCL11] S. Gonzalez, M. Chen, andV. Leung, "Mobility Support for Health Monitoring at Home Using Wearable Sensors," Information Technology in Biomedicine, IEEE Transactions on, 2011.
  • [HE11] H. Hellbruck and T. Esemann, "Limitations of Frequency Hopping in 2.4 GHz ISM-Band for medical applications due to interference," CCNC 2011.
  • [KKHK11] M. Krey, T. Keller, B. Harriehausen, and M. Knoll, "Towards a classification of Information Technology governance frameworks for the development of a IT GRC healthcare framework," CCNC 2011.
  • [KPSYS11] K. Kang, K.-J. Park, J.-J. Song, C.-H. Yoon, and L. Sha, "A Medical-Grade Wireless Architecture for Remote Electrocardiography," Volume: 15 , Issue: 2 , Page(s): 260 - 267, 2011.
  • [KTDCHL11] K. Jeonggil, A. Terzis, S. Dawson-Haggerty, D.E. Culler, J.W. Hui, P. Levis, "Connecting low-power and lossy networks to the internet," Communications Magazine, IEEE , Volume: 49 , Issue: 4 , Page(s): 96 - 101, 2011.
  • [LHL11] C. Lee, K. Ho, and W. Lee, "A Novel Key Management Solution for Reinforcing Compliance with HIPAA Privacy/Security Regulations," Information Technology in Biomedicine, IEEE Transactions on, 2011.
  • [LLLSL11] R. Lu; X. Li; X. Liang; X. Shen; X. Lin, "GRS: The green, reliability, and security of emerging machine to machine communications," Communications Magazine, IEEE , Volume: 49 , Issue: 4 , Page(s): 28 - 35, 2011.
  • [LPRSS11] D. Lockery, J.F. Peters, S. Ramanna, B.L. Shay, and T. Szturm, "Store-and-Feedforward Adaptive Gaming System for Hand-Finger Motion Tracking in Telerehabilitation," Information Technology in Biomedicine, IEEE Transactions on, Volume: 15 , Issue: 3 , Page(s): 467 - 473, 2011.
  • [MCMAZJWM11] M. Mulvenna, W. Carswell, P. Mccullagh, J.C. Augusto, H. Zheng, P. Jeffers, H. Wang, and S. Martin, "Visualization of data for ambient assisted living services," Communications Magazine, IEEE , Volume: 49 , Issue: 1 Page(s): 110 - 117, 2011.
  • [NASA11] M. Najafi, S. Aghtar, K. Sartipi, and N. Archer, "Virtual Remote Nursing system," CCNC 2011.
  • [NG11] H.A.J. Narayanan and M.H. Gunes, "Ensuring access control in cloud provisionedhealthcare systems," CCNC 2011.
  • [SLP11] J. H. Shin, B. Lee, and K. S. Park, "Detection of Abnormal Living Patterns for Elderly Living Alone Using Support Vector Data Description, Information Technology in Biomedicine," IEEE Transactions on, Volume: 15 , Issue: 3 , Page(s): 438 - 448, 2011.
  • [TMSK11] T. Tamura, I. Mizukura, M. Sekine, and Y. Kimura, "Monitoring and evaluation of blood pressure changes with a home healthcare system," Information Technology in Biomedicine, IEEE Transactions on, 2011. .

  • [YRCC10] Jie Yang, Yanzhi Ren, Yingying Chen, and Mooi Choo Chuah, "A Social Community Based Approach for Reducing the Propagation of Infectious Diseases in Healthcare," ACM SIGMOBILE Mobile Computing and Communications Review (ACM MC2R), 2010.
  • [LBMBD11] B. Latre, B. Braem, I. Moerman, C. Blondia, and P. Demeester, "A survey on wireless body area networks," Kluwer Academic Publishers: Wireless Networks, Volume 17, Number 1, Page(s): 1-18, 2011.
  • [CGVC10] M. Chen, S. Gonzalez, A. Vasilakos, H. Cao , V. C. M. Leung, "body area network: a survey," Springer: Mobile Networks and Applications, Page(s):1-23, 2010.
  • [SHBBCISZS10] S. Ullah, H. Higgins, B. Braem, B. Latre, C. Blondia, I. Moerman, S. Saleem, Z. Rahman, and K.S. Kwak, "A Comprehensive Survey of Wireless Body Area Networks," Springer: Journal of Medical Systems, Page(s):1-30, 2010.
  • [HPBRCAL09] M.A. Hanson, H.C. Powell, A.T. Barth, K. Ringgenberg, B.H. Calhoun, J.H. Aylor, and J. Lach, " Body area sensor networks: Challenges and opportunities," Computer, Volume 42, Number 1, Page(s):58-65, 2009.
  • [LLK09] C. Li, H.B. Li, and R. Kohno, "Performance evaluation of IEEE 802.15. 4 for wireless body area network (WBAN)," Communications Workshops, IEEE International Conference on, Page(s):1-5, 2009.
  • [YP09] K. Y. Yazdandoost, K. Sayrafian-Pour, "Channel Model for Body Area Network," IEEE P802.15-08-0780-09-0006, April 2009.
  • [ZKTK10] B. Zhen, M. Kim, J.-i. Takada and R. Kohno, "Finite-state Markov model for on-body channels with human movements, " IEEE Communications (ICC), International Conference on, Page(s):1-5, 2010.
  • [BTR10] B. Zhen, T. Aoyagi, and R. Kohno, "for Time-Varying Fading of Dynamic On-Body Channels," Wireless Communications and Networking Conference (WCNC), Page(s):1-5, 2010.
  • [HVCH09] H. Cao, V. Leung, C. Chow, and H. Chan, "Enabling technologies for wireless body area networks: a survey and outlook," Communications Magazine, IEEE, Vol. 47, No.12, Page(s): 84-93, 2009.
  • [OOSSPP09] T. O'Donovan, J. O'Donoghue, C. Sreenan, D. Sammon, P. O'Reilly, K.A. O'Connor, "A context aware wireless body area network (BAN)," 3rd International Conference on Pervasive Computing Technologies for Healthcare, Page(s):1-8, 2009.
  • [YJJEKCP09] Y. Chen, J. Teo, J.C.Y. Lai, E. Gunawan, K.S. Low, C. B. Soh, and P.B. Rapajic, " Cooperative communications in ultra-wideband wireless body area networks: channel modeling and system diversity analysis," IEEE Journal on Selected Areas in Communications, Volume 27, Number 1, Page(s):5-16, 2009.
  • [EWBBGELIC09] E. Reusens, W. Joseph, B. Latr, B. Braem, G. Vermeeren, E. Tanghe, L. Martens, I. Moerman, C. Blondia, " Characterization of on-body communication channel and energy efficient topology design for wireless body area networks," IEEE Transactions on Information Technology in Biomedicine, Volume 13, Number 6, Page(s):933-945, 2009.
  • [SZ09] H. Su and X. Zhang, " Battery-dynamics driven TDMA MAC protocols for wireless body-area monitoring networks in healthcare applications," IEEE Journal on Selected Areas in Communications, Volume 27, Number 4, Page(s): 424-434, 2009.
  • [ZW09] T. Zasowski and A. Wittneben, " Performance of UWB receivers with partial CSI using a simple body area network channel model," IEEE Journal on Selected Areas in Communications, Volume 27, Number 1, Page(s): 17-26, 2009.
  • [VBG10] K. K. Venkatasubramanian, A. Banerjee and S. K. S. Gupta, "PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks", IEEE Transactions on Information Technology in Biomedicine, Volume 14, Issue 1, Page(s):60 - 68 Digital Object Identifier 10.1109/TITB.2009.2037617, Jan. 2010.
  • [CLCC09] H. Cao, V. Leung, C. Chow and H. Chan, "Enabling Technologies for Wireless Body Area Networks: A Survey and Outlook", Consumer Communications and Networking, IEEE Communications Magzine, Page(s): 84 -93, Dec. 2009.
  • [FFYWTS10] M. Fujii, R. Fujii, R. Yotsuki, T. Wuren, T. Takai and I. Sakagami, "Exploration of Whole Human Body and UWB Radiation Interaction by Efficient and Accurate Two-Debye-Pole Tissue Models", Antennas and Propagation, IEEE Transactions on Volume 58, Issue 2, Page(s): 515-524, Feb. 2010.
  • [CGLZL10] M. Chen, S. Gonzalez, V. Leung, Q. Zhang and M. Li, "A 2G-RFID-Based E-Healthcare System", Wireless Technologies for E-Healthcare, IEEE Wireless Communications, Page(s) 37-43, Feb. 2010.
  • [KKHLX2008] S. Kumar, K. Kambhatla, F. Hu, M. Lifson, and Y. Xiao, "Ubiquitous Computing for Remote Cardiac Patient Monitoring: A Survey", International Journal of Telemedicine and Applications, Apr. 2008.
  • [MHBHMGBT08] E. Monton, J. F. Hernandez, J. M. Blasco, T. Herve, J. Micallef, I. Grech, A. Brincat and V. Traver, "Body Area Network for Wireless Patient Monitoring", Telemedicine an E-health Communication Systems, IET Commun, Page(s) 215-222, 2008.
  • [TZPB08] X. Teng, Y. Zhang, C. Poon and P. Bonato, "Wearable Medical Systems for p-Health", IEEE Reviews in Biomedical Engineering, Volumn 1, Page(s) 62-74, Dec. 2008.
  • [QRB10] M. Quwaider, J. Rao and S. Biswas, "Transmission Power Assignment with Postural Position Inference for On-Body Wireless Communication Links", ACM Transactions on Embedded Computing Systems, Volumn 10, Issue 1, Article 14, Aug. 2010.
  • [Y10] M. Yuce, "Implementation of Wireless Body Area Networks for Healthcare Systems", Sensors and Actuators A, Page(s) 116-129, 2010.
  • [MW08] K. Malasri and L. Wang, "Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network", UbiComp'08, Page(s) 172-181, Sept. 2008.
  • [SBBEV10] D. Sow, A. Biem, M. Blount, M. Ebling and O. Verscheure, "Body Sensor Data Processing using Stream Computing", MIR'10, Page(s) 449-457, Mar. 2010.
  • [GKTP10] M. Garg, D. Kim, D. Turaga and B. Prabhakaran, "Multimodal Analysis of Body Sensor Network Data Streams for Real-time Healthcare", MIR'10, Page(s) 469-477, Mar. 2010.
  • [LPLCE08] H. Lee, K. Park, B. Lee, J. Choi and R. Elmasri, "Issues in Data Fusion for Healthcare Monitoring", PETRA'08, Jul. 2008.
  • [BS10] T. Bourdenas and M. Sloman, "Starfish: Policy Driven Self-Management in Wireless Sensor Networks", SEAMS'10, May, 2010.
  • [LTTMK09] H. Li, T. Takahashi, M. Toyoda, Y. Mori and R. Kohno, "Wireless Body Area Network Combined with Satellite Communication for Remote Medical and Healthcare Applications", Wireless Pers Commun, Volumn 51, Page(s) 697-709, 2009.
  • [LL08] W. Lee and C. Lee, "A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations", IEEE Transactions on Information Technology in Biomedicine, Volumn 12, Issue 1, Jan. 2008.
  • [YHBD04] Y. Yang, X. Han, F. Bao and R. Deng, "A Smart-Card-Enabled Privacy Preserving E-Prescription System", IEEE Transactions on Information Technology in Biomedicine, Volumn 8, Issue 1, Jan. 2004.
  • [RCBC09] K. Rasmussen, C. Castelluccia, T. Benjamin and S. Capkun, "Proximity-based Access Control for Implantable Medical Devices", CCS'09, Nov. 2009.
  • [LLR10] M. Li, W. Lou and K. Ren, "Data Security and Privacy in Wireless Body Area Networks", Wireless Technologies for E-Healthcare, IEEE Wireless Communications, Page(s) 51-58, Feb. 2010.
  • [XLG08] L. Xiao, P. Lewis and A. Gibb, "Developing a Security Protocol for a Distributed Decision Support System in a Healthcare Environment", ICSE'08, Page(s) 673-682, May 2008.
  • [SHS09] R. Sulaiman, X. Huang and D. Sharma, "E-Health Services with Secure Mobile Agent", Page(s) 270-277, 2009.
  • [YKS06] G. Yee, L. Korba and R. Song, "Ensuring Privacy for E-Health Services", ARES'06, 2006.
  • [SSCK09] J. Sriram, M. Shin, T. Choudhury and D. Kotz, "Activity-aware ECG-based Patient Authentication for Remote Health Monitoring", ICMI-MLMI'09, Page(s) 297-304, Nov. 2009.
  • [LYLR10] M. Li, S. Yu, W. Lou and K. Ren, "Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks", INFOCOM'10, 2010.
  • [HHCHP09] Y. Huang, M. Hsieh, H. Chao, S. Hung and J. Park, "Pervasive, Secure Access to a Hierarchical Sensor-Based Healthcare Monitoring Architecture in Wireless Heterogeneous Networks", IEEE JSAC, volumn 27, Issue 4, May 2009.
  • [MFHW09] O. Morchon, T. Falck, T. Heer and K. Wehrle, "Security for Pervasive Medical Sensor Networks", MOBIQUITOUS'09, 2009.
  • [VG10] K. Venkatasubramanian and S. Gupta, "Physiological Value-Based Efficient Usable Security Solutions for Body Sensor Networks", ACM Transactions on Sensor Networks, Volumn 6, Issue 4, Article 31, Jul. 2010.
  • [SFZ10] J. Sun, Y. Fang and X. Zhu, "Privacy and Emergency Response in E-Healthcare Leveraging Wireless Body Sensor Networks", Wireless Technologies for E-Healthcare, IEEE Wireless Communication, Feb. 2010.
  • [RGFN08] B. Riedl, V. Grascher, S. Fenz and T. Neubauer, "Pseudonymization for improving the Privacy in e-Health Applicaitons", Proceedings of the 41 st Hawaii International Conference on System Sciences, 2008.
  • [FCDX09] B. Fung, M. Cao, B. Desai and H. Xu, "Privacy Protection for RFID Data", SAC'09, Page(s) 1528 - 1535, Mar. 2009.
  • [S09] H. Simkevitz, "Why Privacy Matters in Health Care Delivery: a Value Proposition", World Congress on Privacy, Security, Trust and the Management of e-Business, Page(s) 193-201, 2009.
  • [BBM09] D. Bauer, D. Blough and A. Mohan, "Redactable Signatures on Data with Dependencies and their Application to Personal Health Records", WPES'09, Page(s) 91-99, Nov. 2009.
  • [QB08] M. Quwaider and S. Biswas, "Body Posture Identification using Hidden Markov Model with a Wearable Sensor Network", BodyNets'08, 2008.
  • [BCHL09] J. Benaloh, M. Chase, E. Horvitz and K. Lauter, "Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records", CCSW'09, Nov. 2009.
  • [SF09] J. Sun and Y. Fang, "Cross-Domain Data Sharing in Distributed Electronic-Health=Record System", IEEE Transactions on Parallel and Distributed Systems, 2009.
  • [RN08] L. Rostad and O. Nytro, "Personalized Access Control for a Personally Controlled Health Record", CSAW'08, Page(s) 9-15, Oct. 2008,
  • [MFHL09] N. Mohammed, B. Fung, P. Hung and C. Lee, "Anonymizing Healthcare Data: A Case Study on the Blood Transfusion Service", KDD'09, Page(s) 1285-1293, Jun. 2009.
  • [DS08] Y. Dahl and D. Svanas, "A comparison of location and token-based interaction techniques for point-of-care access to medical information", Pers Ubiquit Comput, Volumn 12, Page(s) 459-478, 2008.
  • [JAHCZ09] J. Jin, G. Ahn, H. Hu, M. Covington and X. Zhang, "Patient-centric Authorization Framework for Sharing Electronic Health Records", SACMAT'09, Page(s) 125-134, Jun. 2009.
  • [GA09] K. Garson and C. Adams, "Security and Privacy System Architecture for an e-Hospital Environment", IDtrust'08, Page(s) 122-130, Mar. 2008.
  • [TMC09] A. Toninelli, R. Montanari and A. Corradi, "Enabling Secure Service Discovery in Mobile Healthcare Enterprise Networks", Application and Support Technologies for Mobility and Enterprise Services, IEEE Wireless Communications, Page(s) 24-32, Jun. 2009.
  • [KO10] P. Kulkarni and Y. Ozturk, "mPHASiS: Mobile Patient Healthcare and Sensor Information System", Journal of Network and Computer Applications, 2010.
  • [VBSG09] D. Vassis, P. Belsis, C. Skourlas and S. Gritzalis, "End-to-end Secure Communication in Ad Hoc Assistive Medical Environments using Secure Paths", PETRA'09, Jun. 2009.
  • [VBSP10] D. Vassis, P. Belsis, C. Skourlas and G. Pantziou, "Providing Advanced Remote Medical Treatment Services through Pervasive Environments", Pers Ubiquit Comput, Volumn 14, Page(s)563-573, 2010.
  • [CVL09] A. Chryssanthous, I. Varlamis and C. Latsiou, "Security and Trust in Virtual Healthcare Communities", PETRA'09, Jun. 2009.
  • [GB10] C. Gates and M. Bishop, "The Security and Privacy Implications of Using Social Networks to Deliver Healthcare", PETRA'10, Jun. 2010.
  • [W10] J. Williams, "Social Networking Applications in Health Care: Threats to the Privacy and Security of Health Information", SEHC'10, Page(s) 39-49, May 2010.
  • [VBSG08] D. Vassis, P. Belsis, C. Skourlas and S. Gritzalis, "A Pervasive Architectural Framework for Providing Remote Medical Treatment", PETRA'08, Jun. 2008.
  • [PKBDK98] S. Pavlopoulos, E. Kyriacou, A. Berler, S. Dembeyiotis and D. Koutsouris, "A Novel Emergency Telemedicine System Based on Wireless Communication Technology-AMBULANCE", IEEE Transactions on Information Technology in Biomedicine, Volumn 2, Issue 4, Page(s) 261-267, Dec. 1998.
  • [KLCMTM10] J. Ko, J. Lim, Y. Chen, R. Musaloiu, A. Terzis and G. Masson, "MEDiSN: Medical Emergency Detection in Sensor Networks", ACM Transactions on Embedded Computing Systems, Volumn 10, Issue 11, Article 11, Aug. 2010.
  • [LLLS10a] Rongxing Lu , Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen, "Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network", Proc. BodyNets'10, Corfu Island, Greece, September 10-12, 2010.
  • [LLLS10b] Xiaohui Liang, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen, "Patient Self-controllable Access Policy on PHI in eHealthcare Systems", AHIC 2010, Kitchener, Ontario, Canada, 2010.
  • [VBG10] K. K. Venkatasubramanian, A. Banerjee and S. K. S. Gupta, "PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks", Information Technology in Biomedicine, IEEE Transactions on Volume 14, Issue 1, Page(s):60 - 68 Digital Object Identifier 10.1109/TITB.2009.2037617, Jan. 2010.

  • [AJA09] A. Appari, M. E. Johnson and D. L. Anthony, "HIPAA Compliance in Home Health: A Neo-Institutional Theoretic Perspective", CCS'09 Workshop on SPIMACS, 2009.
  • [B09] M. Benaissa, "Secure and privacy aware RFIDs", Design and Test Workshop (IDT), 2009 4th International 15-17 Nov. 2009 Page(s):1 - 1 Digital Object Identifier 10.1109/IDT.2009.5404080, 2009.
  • [BR09] A. Boukerche and Y. Ren, "A Secure Mobile Healthcare System using Trust-Based Multicast Scheme", IEEE Journal on Selected Areas in Communications, Vol. 27, No. 4, May 2009.
  • [BVGS09] P. Belsis, D. Vassis, S. Gritzalis and C. Skourlas, "W-EHR: A Wireless Distributed Framework for Secure Dissemination of Electronic Healthcare Records", Systems, Signals and Image Processing, 2009. IWSSIP 2009. 16th International Conference on 18-20 June 2009 Page(s):1 - 4 Digital Object Identifier 10.1109/IWSSIP.2009.5367721, 2009.
  • [C09] K. E. Caine, "Visual Sensing Devices in Home-Care Systems", CCS'09 Workshop on SPIMACS, 2009.
  • [CH09] J. Chessman, A. R. Heminger, "A Study of U.S. Battlefield Medical Treatment/Evacuation Compliance with HIPAA Requirements", System Sciences, 2009. HICSS '09. 42nd Hawaii International Conference on 5-8 Jan. 2009 Page(s):1 - 10 Digital Object Identifier 10.1109/HICSS.2009.38, 2009.
  • [CJXJ09] F. Currim, E. Jung, X. Xiao and I. Jo, "Privacy Policy Enforcement For Health Information Data Access". In WiMD 2009.
  • [DMV09] W. Dasun, R. Muttukrishnan, and R. Veselin, "Trust delegation for medical records access using public mobile networks", Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009. 3rd International Conference on 1-3 April 2009 Page(s):1 - 7.
  • [FCFCZCA09] A. Ferreira, D. Chadwick, P. Farinha, R. Correia, G. Zao, R. Chilro and L. Antunes, "How to Securely Break into RBAC: The BTG-RBAC Model", Computer Security Applications Conference, 2009. ACSAC '09. Annual 7-11 Dec. 2009 Page(s):23 - 31 Digital Object Identifier 10.1109/ACSAC.2009.12, 2009.
  • [GE09] M. Guennoun and K. El-Khatib, "Securing medical data in smart homes", Medical Measurements and Applications, 2009. MeMeA 2009. IEEE International Workshop on 29-30 May 2009 Page(s):104 - 107 Digital Object Identifier 10.1109/MEMEA.2009.5167964,2009.
  • [GFHW09a] O. Garcia-Morchon, T. Falck, T. Heer and K. Wehrle, "Security for pervasive medical sensor networks", Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous, 2009. MobiQuitous '09. 6th Annual International 13-16 July 2009 Page(s):1 - 10 Digital Object Identifier 10.4108/ICST.MOBIQUITOUS2009.6832, 2009.
  • [GFHW09b] O. Garcia-Morchon, T. Falck, T. Heer and K. Wehrle, "Security for pervasive healthcare", Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous, 2009. MobiQuitous '09. 6th Annual International 13-16 July 2009 Page(s):1 - 2 Digital Object Identifier 10.4108/ICST.MOBIQUITOUS2009.6962, 2009.
  • [GGPGR09] R. W. Gardner, S. Garera, M. W. Pagano, M. Green and A. D. Rubin, "Securing Medical Records on Smart Phones", CCS'09 Workshop on SPIMACS, 2009.
  • [HHCHP09] Y. M. Huang, M. Y. Hsieh, H. C. Chao, S. H. Hung and J. H. Park, "Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks", Selected Areas in Communications, IEEE Journal on Volume 27, Issue 4, May 2009 Page(s):400 - 411.
    Digital Object Identifier 10.1109/JSAC.2009.090505, 2009.
  • [HIH09] S. Habibullayev, K. Ibadullayev, R. Hasanov, "Electronic health card system", Application of Information and Communication Technologies, 2009. AICT 2009. International Conference on 14-16 Oct. 2009 Page(s):1 - 4 Digital Object Identifier 10.1109/ICAICT.2009.5372528, 2009.
  • [HK09] R. Hewett, and P. Kijsanayothin, "On securing privacy in composite web service transactions", Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for 9-12 Nov. 2009 Page(s):1 - 6, 2009.
  • [HM09] C. G. Hembroff and S. Muftic, "Secure healthcare information exchange for local domains". PervasiveHealth 2009. pages 1-7, 1-3 April 2009.
  • [HMKIMKRL09] A. P. Happonen, E. Mattila,M.-L. Kinnunen, V. Ikonen, T. Myllymaki, K. Kaipainen, H. Rusko and R. Lappalainen, "P4Well concept to empower self-management of psychophysiological wellbeing and load recovery", Korhonen, Ilkka; Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009. 3rd International Conference on 1-3 April 2009 Page(s):1 - 8 Digital Object Identifier 10.4108/ICST.PERVASIVEHEALTH2009.6037, 2009.
  • [HPBRCAL09] M. A. Hanson, H. C. Powell Jr., A. T. Barth, K. Ringgenberg, B. H. Calhoun, J. H. Aylor and J. Lach, "Body Area Sensor Networks:Challenges and Opportunities", Computer,Jan. 2009, Page(s) 58-66.
  • [HRY09] S. Hussain, M. S. Rahman, and L. T. Yang, "Key predistribution scheme using keyed-hash chain and multipath key reinforcement for wireless sensor networks", Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on 9-13 March 2009 Page(s):1 - 6.
  • [HZ09] C. Hua and R. Zheng, "Robust Resource Management for Predictable Services in Wireless Healthcare". In WiMD 2009.
  • [IG09] M. Ibrohimovna and S. Groot, "A Framework for Access Control and Management in Dynamic Cooperative and Federated Environments", Telecommunications, 2009. AICT '09. Fifth Advanced International Conference on 24-28 May 2009 Page(s):459 - 466 Digital Object Identifier 10.1109/AICT.2009.81, 2009.
  • [IJR09] A. Ismo, R. Jukka, and K. Rauni, "Pervasive pain monitoring system: User experiences and adoption requirements in the hospital and home environments", Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009. 3rd International Conference on 1-3.
  • [JHHKK09] W. Jung, S. Hong, M. Ha, Y.-J. Kim and D. Kim, "SSL-Based Lightweight Security of IP-Based Wireless Sensor Networks", Advanced Information Networking and Applications Workshops, 2009. WAINA '09. International Conference on 26-29 May 2009 Page(s):1112 - 1117 Digital Object Identifier 10.1109/WAINA.2009.47, 2009.
  • [JXGB09] S. Jiang, Y. Xue, A. Giani and R. Bajcsy, "Robust Medical Data Delivery for Wireless Pervasive Healthcare", Dependable, Autonomic and Secure Computing, 2009. DASC '09. Eighth IEEE International Conference on 12-14 Dec. 2009 Page(s):802 - 807 Digital Object Identifier 10.1109/DASC.2009.87, 2009.
  • [KAB09] D. Kotz, Sasikanth Avancha and Amit Baxi, "A Privacy Framework for Mobile Health and Home-Care Systems" , CCS'09 Workshop on SPIMACS, 2009.
  • [KLS09] S. L. Keoh, E. Lupu, and M. Sloman, "Securing body sensor networks: Sensor association and key management", Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on 9-13 March 2009 Page(s):1 - 6.
  • [KLS09] S. L. Keoh, E. Lupu and M. Sloman, "Securing body sensor networks: Sensor association and key management", Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on 9-13 March 2009 Page(s):1 - 6 Digital Object Identifier 10.1109/PERCOM.2009.4912756, 2009.
  • [KST09] M. Kuroda, Q. Shuye and O. Tochikubo, "Low-power secure body area network for vital sensors toward IEEE802.15.6", Engineering in Medicine and Biology Society, 2009. EMBC 2009. Annual International Conference of the IEEE 3-6 Sept. 2009 Page(s):2442 - 2445 Digital Object Identifier 10.1109/IEMBS.2009.5334428, 2009.
  • [LKPW09] B. Lagesse, M. Kumar, J. M. Paluska, and M. Wright, "DTT: A Distributed Trust Toolkit for pervasive systems", Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on 9-13 March 2009 Page(s):1 - 8.
  • [LLSNK09] X. Lin, R. Lu , X. (Sherman) Shen, Y. Nemoto and N. Kato, SAGE: "A Strong Privacy-Preserving Scheme Against Global Eavesdropping for eHealth Systems". IEEE Journal on Selected Areas in Communications , Vol. 27, No. 4, Page(s) 365 - 378, 2009.
  • [ML09] K. Malasri and W. Lan, "Securing wireless implantable devices for healthcare: Ideas and challenges", Communications Magazine, IEEE Volume 47, Issue 7, July 2009 Page(s):74 - 80 Digital Object Identifier 10.1109/MCOM.2009.5183475, 2009.
  • [MNS09] F. Massacci, V. H. Nguyen and A. Saidane, "No Purpose, No Data: Goal-oriented Access Control for Ambient Assisted Living", CCS'09 Workshop on SPIMACS, 2009.
  • [MRJJPS09] K. Morrison, I. W. Ricketts, M. C. Jones, D. W. Johnston, N. B. Pitts and F. M. Sullivan, "A secure electronic diary and data collection tool", Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009. 3rd International Conference on 1-3 April 2009 Page(s):1 - 4 Digital Object Identifier 10.4108/ICST.PERVASIVEHEALTH2009.5981, 2009.
  • [MS09] J. Misic and X. Shen , "Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications", Int. J. of Telemedicine and Applications, to appear.
  • [MSF09] A. D. Molina, M. Salajegheh and K. Fu, "HICCUPS: Health Information Collaborative Collection Using Privacy and Security", CCS'09 Workshop on SPIMACS, 2009.
  • [MVW09] S. Moncrieff, S. Venkatesh and G.West: "A Framework for the design of privacy preserving pervasive healthcare", ICME 2009, pages:1696 - 1699, June 28 2009-July 3 2009.
  • [MY09] M. Moussa, and M. Youssef, "Smart devices for smart environments: Device-free passive detection in real environments", Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on 9-13 March 2009 Page(s):1 - 6.
  • [NK09] T. Neubauer and M. Kolb, "Technologies for the Pseudonymization of Medical Data: A Legal Evaluation", 2009 Fourth International Conference on Systems, 2009.
  • [NSYM09] A. Natarajan, B. Silva, K.-K. Yap and M. Motani, "Link Layer Behavior of Body Area Networks at 2.4 GHz" , MobiCom'09, September 20-25, 2009, Beijing, China, 2009.
  • [OGO09] L. E. Olson, C. A. Gunter and S. P. Olson, "A Medical Database Case Study for Reflective Database Access Control", CCS'09 Workshop on SPIMACS, 2009.
  • [OMW09] Z. Omary, F. Mtenzi and B. Wu, "How does politics affect electronic healthcare adoption", Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for 9-12 Nov. 2009 Page(s):1 - 8, 2009.
  • [PHHM09] E. Papoutsis, G. Howells, A. Hopkins and K. McDonald-Maier, "Ensuring Secure Healthcare Communications via ICmetric Based Encryption on Unseen Devices", Bio-inspired Learning and Intelligent Systems for Security, 2009. BLISS '09. Symposium Page(s):113 - 117 Digital Object Identifier 10.1109/BLISS.2009.24, 20-21 Aug. 2009.
  • [PJ09] V. Patel and Y. K. Jain, "Wavelet Transform Based Data Perturbation Method for Privacy Protection", Emerging Trends in Engineering and Technology (ICETET), 2009 2nd International Conference on 16-18 Dec. 2009 Page(s):294 - 297 Digital Object Identifier 10.1109/ICETET.2009.232, 2009.
  • [RPRS09] M. A. Rahaman, H. Plate, Y. Roudier adn A. Schaad, "Towards Secure Content Based Dissemination of XML Documents", Information Assurance and Security, 2009. IAS '09. Fifth International Conference on Volume 2, 18-20 Aug. 2009 Page(s):721 - 724 Digital Object Identifier 10.1109/IAS.2009.138, 2009.
  • [RSSCKNT09] M. Rusu,G. Saplacan, G. Sebestyen, C. Cenan, L. Krucz, T. Nicoara and N. Todor, "Distributed e-Health system with Smart Self-care Units", Intelligent Computer Communication and Processing, 2009. ICCP 2009. IEEE 5th International Conference on 27-29 Aug. 2009 Page(s):307 - 314 Digital Object Identifier 10.1109/ICCP.2009.5284744, 2009.
  • [S09a] G. M. Stamatelos, "Secure sensor data transmission over wireless cellular networks", Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009. 3rd International Conference on 1-3 April 2009 Page(s):1 - 5.
  • [S09b] S. Sinclair, "Meta-Observations from an Outsider's Study of Clinical Environments", CCS'09 Workshop on SPIMACS, 2009.
  • [S09c] J. D. Schilling, "Legitimate data in remote monitoring", Engineering in Medicine and Biology Society, 2009. EMBC 2009. Annual International Conference of the IEEE 3-6 Sept. 2009 Page(s):713 - 716 Digital Object Identifier 10.1109/IEMBS.2009.5332686, 2009.
  • [SF09] J. Sun and Y. Fang, "Cross-Domain Data Sharing in Distributed Electronic-Health-Record Systems", Parallel and Distributed Systems, IEEE Transactions on : Accepted for future publication Volume PP, Forthcoming, 2009 Page(s):1 - 1 Digital Object Identifier 10.1109/TPDS.2009.124, 2009.
  • [SG09] Stamatelos, M. George, "Secure sensor data transmission over wireless cellular networks", Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009. 3rd International Conference on 1-3 April 2009 Page(s):1 - 5 Digital Object Identifier 10.4108/ICST.PERVASIVEHEALTH2009.6047, 2009.
  • [SS09] D. Slamanig and C. Stingl, "Disclosing verifiable partial information of signed CDA documents using generalized redactable signatures", e-Health Networking, Applications and Services, 2009. Healthcom 2009. 11th International Conference on 16-18 Dec. 2009 Page(s):146 - 152 Digital Object Identifier 10.1109/HEALTH.2009.5406190, 2009.
  • [SHS09] R. Sulaiman, X. Huang and D. Sharma, "E-health Services with Secure Mobile Agent", Seventh Annual Communication Networks and Services Research Conference, 2009.
  • [SL09a] R. D. Sriram, ; B. Lide, "The role of standards in healthcare automation (Extended abstract)", Automation Science and Engineering, 2009. CASE 2009. IEEE International Conference on 22-25 Aug. 2009 Page(s):79 - 82 Digital Object Identifier 10.1109/COASE.2009.5234111, 2009.
  • [SL09b] J. Shi; K.-Y. Lam, "Vitacode: Electrocardiogram representation for biometric cryptography in body area networks", Ubiquitous and Future Networks, 2009. ICUFN 2009. First International Conference on 7-9 June 2009 Page(s):112 - 115 Digital Object Identifier 10.1109/ICUFN.2009.5174295, 2009.
  • [SLC09] D. Singh, H.-J. Lee and W.-Y. Chung, "Secure IP-Ubiquitous Sensor Network for healthcare applications monitoring In-home area", Applications of Digital Information and Web Technologies, 2009. ICADIWT '09. Second International Conference Page(s):835 - 837 Digital Object Identifier 10.1109/ICADIWT.2009.5273889, on the 4-6 Aug. 2009.
  • [SLGLC09] J. Shi, K.-Y. Lam, M. Gu, M. Li and S.-L. Chung, "Towards Energy-Efficient Secure Communications Using Biometric Key Distribution in Wireless Biomedical Healthcare Networks", Biomedical Engineering and Informatics, 2009. BMEI '09. 2nd International Conference Page(s):1 - 5 Digital Object Identifier 10.1109/BMEI.2009.5304940, 17-19 Oct. 2009.
  • [SS09] D. Slamanig and C. Stingl. "How to Preserve Patient's Privacy and Anonymity in Web-based Electronic Health Records". In Second International Conference on Health Informatics, HEALTHINF 2009, pages 257-264. INSTICC Press, 2009.
  • [TMC09] A. Toninelli, R. Montanari, A. Corradi, "Enabling secure service discovery in mobile healthcare enterprise networks", IEEE Wireless Communications, Volume 16, Issue 3, Page(s):24 - 32 Digital Object Identifier 10.1109/MWC.2009.5109461, June 2009.
  • [TMO09] R. Tinabo, F. Mtenzi, and B. O'Shea, "Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data", Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for 9-12 Nov. 2009.
  • [VBG09] K. K. Venkatasubramanian, A.Banerjee and S. K. S. Gupta, "Green and Sustainable Cyber-Physical Security Solutions for Body Area Networks", Wearable and Implantable Body Sensor Networks, 2009. BSN 2009. Sixth International Workshop on 3-5 June 2009 Page(s):240 - 245 Digital Object Identifier 10.1109/BSN.2009.47, 2009.
  • [WRLZ09] Q. Wang, K. Ren, W. Lou and Y. Zhang, "Dependable and secure sensor data storage with Dynamic integrity assurance", IEEE INFOCOM 2009, Rio de Janeiro, Brazil, April 2009.
  • [WRR09] D. Weerasinghe, M. Rajarajan and V. Rakocevic, "Trust delegation for medical records access using public mobile networks", Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009. 3rd International Conference on 1-3 April 2009 Page(s):1 - 7 Digital Object Identifier 10.4108/ICST.PERVASIVEHEALTH2009.6057, 2009.
  • [XVYSYKL09] N. Xiong, A.Vasilakos, L. Yang, L. Song, P. Yi, R.Kannan and Y. Li, "Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems", Selected Areas in Communications, IEEE Journal on Volume 27, Issue 4, May 2009 Page(s):495 - 509 Digital Object Identifier 10.1109/JSAC.2009.090512, 2009.
  • [YC09] W. D. Yu adn M. Chan, "A modeling approach of web-based mobile parking guidance system and secured EHR in e-Healthcare", e-Health Networking, Applications and Services, 2009. Healthcom 2009. 11th International Conference on 16-18 Dec. 2009 Page(s):116 - 123 Digital Object Identifier 10.1109/HEALTH.2009.5406186, 2009.
  • [YKKPNS09] M.-K. Yoon, J.-E. Kim, K. Kang, K.-J. Park, M.-Y. Nam and L. Sha. "End-to-End Delay Analysis of Wireless ECG over Cellular Networks", In WiMD 2009.
  • [YRL09] S. Yu, K. Ren, and W. Lou, FDAC: "Toward Fine-grained Distributed Data Access Control in Wireless Sensor Networks", IEEE INFOCOM 2009, Rio de Janeiro, Brazil, April 2009.
  • [ZSLK09] Zhu, Yanmin; Sloman, Morris; Lupu, Emil; Keoh, Sye Loong;esta: "A secure and autonomic system for pervasive healthcare", Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009. 3rd International Conference on 1-3 April 2009 Page(s):1 - 8.
  • [ZZR09] R. Zhang, Y. Zhang and K. Ren, DP2AC: "distributed privacy-preserving access control in sensor networks", IEEE INFOCOM 2009, Rio de Janeiro, Brazil, April 2009.

  • [AC08] Richard Au and Peter Croll, "Consumer-Centric and Privacy-preserving Identity Management for Distributed e-Health Systems", Proceedings of the 41st Hawaii International Conference on System Sciences, 2008.
  • [AF08] Bandar Alhaqbani, Colin Fidge, "Privacy-Preserving Electronic Health Record Linkage Using Pseudonym Identifiers", HealthCom 2008.
  • [AGBHJ08] A. Annadhorai, E. Guenterberg, J. Barnes, K. Haraga and R. Jafari: "Human Identification by Gait Analysis". In HealthNet, 2008.
  • [ASA08] S. I. Ahamed, M. Sharmin, and S. Ahmed, "A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing", Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE International Conference on 17-21 March 2008 Page(s):590 - 595.
  • [BPZS08] S.-D. Bao, C.C.Y. Poon, Y.-T. Zhang and L.-F. Shen, "Using the Timing Information of Hearbeats as an Entity Identifier to Secure Body Sensor Network", IEEE Transactions on Information Technology in Biomedicine, Vol. 12, Page(s) 772-779, 2008.
  • [CBKJ08] H. Chen, J. P. Black, O. Z. Khan and K. Jamshaid: "Data-Centric Support of a Smart Walker in a Ubiquitous-Computing Environment". In HealthNet, 2008.
  • [CCCW08] Y.-J. Chang, C.-N. Chen, L.-D. Chou, and T.-Y. Wang, "A novel indoor wayfinding system based on passive RFID for individuals with cognitive impairments" Pervasive Computing Technologies for Healthcare, 2008. PervasiveHealth 2008. Second International Conference on Jan. 30 2008-Feb. 1 2008 Page(s):108 - 111.
  • [DSCPJ08] M. Deng, R. Scandariato, D.D. Cock, Bart Preneel and Wouter Joosen, "Identity in Federated Electronic Healthcare", Wireless Days, 2008, 1st IFIP 24-27 Nov. 2008.
  • [HLLWD08] Y. Hong, S. Lu, Q. Liu, L. Wang and R. Dssouli, "Preserving Privacy in e-Health Systems Using Hippocratic Databases", COMPSAC '08, pages:692 - 697, July 28 2008-Aug. 1 2008.
  • [HPG08] Y. Hong, T. B. Patrick and R. Gillis, "Protection of Patient's Privacy and Data Security in E-Health Services", 2008 International Conference on BioMedical Engineering and Informatics,2008.
  • [HSY08] N. Huda, N. Sonehara and S. Yamada. A Privacy Management Architecture for Patient-Controlled Personal Health Record System. In International Conference on Network Applications, Protocols and Services 2008, NetApps 2008. IEEE Computer Society, 2008.
  • [KLFL08] F. Kargl, E. Lawrence, M. Fischer and Y. Y. Lim, "Security, Privacy and Legal Issues in Pervasive eHealth Monitoring Systems", 7th International Conference on Mobile Business, 2008.
  • [KLL08] Y. H. Kim, H. Lee, and D. H. Lee, "A Key Distribution Scheme for Wireless Sensor Networks", Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE International Conference on 17-21 March 2008 Page(s):572 - 577.
  • [KS08] S. Kahn and V. Sheshadri, "Medical Record Privacy and Security in a Digital Environment", IT Professional, Volume 10, Issue 2, March-April 2008.
  • [KV08] V.Koufi, and G.Vassilacopoulos, "HDGPortal: A Grid portal application for pervasive access to process-based healthcare systems", Pervasive Computing Technologies for Healthcare, 2008. PervasiveHealth 2008. Second International Conference on Jan. 30 2008-Feb. 1 2008 Page(s):121 - 126.
  • [LK08] B. Lee and H. Kim, "Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader", Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2008.
  • [LL08] W.-B. Lee and C.-D. Lee, "A cryptographic Key management Solution for HIPAA Privacy/Security Regulations", IEEE Transactions on Information Technology in Biomedicine, Vol. 12, Page(s) 34-41, 2008.
  • [LLK08] J. Lahteenmaki, J. Leppanen, and H. Kaijanranta, "Document-based service architecture for communication between health and wellness service providers and customers", Pervasive Computing Technologies for Healthcare, 2008. PervasiveHealth 2008. Second International Conference on Jan. 30 2008-Feb. 1 2008 Page(s):275 - 278.
  • [M08a] J. A. MacDonald, "Authentication Considerations for Mobile e-health Applications", Pervasive Computing Technologies for Healthcare 2008, Second International Conference, Jan. 30 2008-Feb.
  • [M08b] J. A. MacDonald, "Cellular Authentication & Key Agreement for Service Providers", Pervasive Computing Technologies for Healthcare 2008, Second International Conference, Jan. 30 2008-Feb. 1 2008.
  • [M08c] J. Misic, "Enforcing Patient Privacy in Healthcare WSNs Using ECC Implemented on 802.15.4 Beacon Enabled Clusters", Proceedings of 6th Annual IEEE International Conference on Pervasive Computing and Communications, Page(s) 686-691, 2008.
  • [MB08] O.G. Morchon and H. Baldus, Efficient distributed security for wireless medical sensor networks,International Conference on Intelligent Sensors, Sensor Networks and Information Processing, (ISSNIP), Page(s)249-254, 15-18 Dec. 2008.
  • [MMMMSPM08] A. K. Maji, Arpita Mukhoty, A. K. Majumdar, Jayanta Mukhopadhyay, Shamik Sural, Soubhik Paul, Bandana Majumdar, "Security Analysis and Implementation of Web-based Telemedicine Services with a Four-tier Architecture", Pervasive Computing Technologies for Healthcare, 2008, Second International Conference, Jan. 30 2008-Feb. 1 2008.
  • [MO08] R. Muraleedharan and L.A. Osadciw, "Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence", Communication Networks and Services Research Conference, 2008. CNSR 2008. 6th Annual 5-8 May 2008, Page(s):165 - 170.
  • [OHS08] E. Oztiirk, G. Hammouri, and B. Sunar, "Towards Robust Low Cost Authentication for Pervasive Devices", Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE International Conference on 17-21 March 2008 Page(s):170 - 178.
  • [PMSST08] R. Di Pietro, L.V. Mancini, C. Soriente, A. Spognardi and G. Tsudik, Catch Me (If You Can): Data Survival in Unattended Sensor Networks, IEEE PerCom '08, Page(s)185-194, 17-21 Mar. 2008.
  • [PPR08] M. Puzar, T. Plagemann, and Y. Roudier, "Security and privacy issues in middleware for emergency and rescue applications", Pervasive Computing Technologies for Healthcare, 2008. PervasiveHealth 2008. Second International Conference on Jan. 30 2008-Feb. 1 2008 Page(s):89 - 92 .
  • [RB08] Y. Ren and A. Boukerche, "Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks", Proc. IEEE International Conference on Communications, Page(s) 2129-2133, 2008.
  • [RGFN08] B. Riedl, V. Grascher, Stefan Fenz, Thomas Neubauer, "Pseudonymization for improving the Privacy in e-Health Applications", Proceedings of the 41st Hawaii International Conference on System Sciences, 2008.
  • [RGN08] B. Riedl, V. Grascher, and T. Neubauer. A Secure e-Health Architecture based on the Appliance of Pseudonymization. Journal of Software, 3(2):23-32, 2008.
  • [RGKN08] B. Riedl, V. Grascher, M.Kolb and T. Neubauer, "Economic and Security Aspects of applying a Threshold Scheme in e-Health", The Third International Conference on Availability, Reliability and Security, 2008.
  • [SMDB] K. M. Sharmilee, R. Mukesh, A. Damodaram and V. S. Bharathi, "Secure WBAN Using Rule-Based IDS With Biometrics And MAC Authentication", HealthCom 2008.
  • [SS08a] D. Slamanig and C. Stingl, "Privacy Aspects of eHealth", The Third International Conference on Availability, Reliability and Security, 2008.
  • [SS08b]C. Stingl and D. Slamanig. Privacy Enhancing Methods for eHealth Applications: How to Prevent Statistical Analyses and Attacks. Int. J. Business Intelligence and Data Mining, 3(3):236-254, 2008.
  • [SS08c] P. Schartner and M. Schaffer. Protecting Privacy in Medical Databases - Efficient Local Generation of System-Wide Unique Health IDs. In First International Conference on Health Informatics, HEALTHINF 2008, pages 51-58. INSTICC Press, 2008.
  • [SSMH08] D. Slamanig, C. Stingl, C. Menard and M. Heiligenbrunner, "Jürgen Thierry: Anonymity and Application Privacy in Context of Mobile Computing in eHealth." Mobile Response 2008 : 148-157.
  • [SVB08] J. Singh, L. Vargas, J. Bacon, "A model for controlling data flow in distributed healthcare environments", Pervasive Computing Technologies for Healthcare, 2008. PervasiveHealth 2008. Second International Conference on Jan. 30 2008-Feb. 1 2008 Page(s):188 - 191.
  • [SVH08] Z. Stapic, N. Vrcek and G. Hajdin, "Evaluation of Security and Privacy Issues in Integrated Mobile Telemedical System", ITI 2008 30th Int. Conf. on Information Technology Interfaces, June 23-26, 2008, Cavtat, Croatia.
  • [V08] U. Varshney, "Improving Wireless Health Monitoring Using Incentive-Based Router Cooperation", Computer, Vol. 2, Page(s) 181-191, 2008.
  • [VG08] K. Venkatasubramanian and S.K. Gupta. AYUSHMAN: A Secure, Usable Pervasive Health Monitoring System. In HealthNet, 2008.
  • [VBG08] K.K. Venkatasubramanian, A. Banerjee and S.K.S. Gupta, "EKG-based Key Agreement in Body Sensor Networks", Proceedings of IEEE Conference on Computer Communications Workshops, 2008.
  • [VMM08] R. Velentzas, A. Marsh and G. Min, "Wireless Connected Home with Integrated Secure Healthcare Services for Elderly People", Proceedings of ACM international conference on Pervasive Technologies Related to Assistive Environments, Page(s) 44-60, 2008.
  • [WERR08] D.Weerasinghe, K.Elmufti, M.Rajarajan, and V.Rakocevic, "Patient's privacy protection with anonymous access to medical services", Pervasive Computing Technologies for Healthcare, 2008. PervasiveHealth 2008. Second International Conference on Jan. 30 2008-Feb. 1 2008 Page(s):127 - 130.
  • [YGM08] W. D. Yu, R.Gummadikayala, S.Mudumbi, "A web-based wireless mobile system design of security and privacy framework for u-Healthcare" E-health Networking, Applications and Services, 2008. HealthCom 2008. 10th International Conference on 7-9 July 2008 Page(s):96 - 101.
  • [YWLL08] Y.-T. Yeh, S.-J. Wu, C.-T. Liu, and T.-I. Lee, "Assessment of user satisfaction with an Internet-based integrated patient education system for diabetes management", E -health Networking, Applications and Services, 2008. HealthCom 2008. 10th International Conference on 7-9 July 2008 Page(s):85 - 89.

  • [AJ07] R. Agrawal, C. Johnson. Securing electronic health records without impeding the flow of information. International Journal of Medical Informatics, Volume 76, Issue 5, Pages 471-479.
  • [BHHS07] E. Bones, P. Hasvold, E. Henriksen and T. Strandenes, "Risk analysis of information security in a mobile instant messaging and presence system for healthcare", International J. Medical Informatics, Vol. 76, Page(s) 677-687, 2007.
  • [BPSW07] J. Brickell, D. E. Porter , V. Shmatikov and E. Witchel, "Privacy-preserving remote diagnostics", ACM Conference on Computer and Communications Security (CCS) 2007 : 498-507.
  • [CR07] Arnab Chowdhury, Pradeep Ray, "Privacy Management in Consumer e-Health", e-Health Networking, Application and Services, 2007 9th International Conference, 19-22 June 2007.
  • [CWLM07] W. Chung, G. Walia, Y. Lee and R. Myllyla, "Design Issues and Implementation of Query-Driven Healthcare System Using Wireless Sensor Ad-hoc Network", Proc. 4th Annual IEEE International Workshop on Wearable and Implantable Body Sensor Networks (BSN), Page(s) 99-104, 2007.
  • [DL07] F. W. Dillema and S. Lupetti. Rendezvous-based access control for medical records in the pre-hospital environment. In HealthNet, Page(s) 1-6, 2007.
  • [DNW07] S. Dagtas, Y. Natchetoi and H. Wu, "An Integrated Wireless Sensing and Mobile Processing Architecture for Assisted Living and Healthcare Applications", Proc. 1st ACM international workshop on systems and networking support for healthcare and assisted living environments, Page(s) 70-72, 2007.
  • [FBEK07] Thomas Falck, H. Baldus, J. Espina and Karin Klabunde, "Plug ‘n Play Simplicity for Wireless Medical Body Sensors", Mobile Netw Appl (2007) 12:143-153 DOI 10.1007/s11036-007-0016-2.
  • [JYS07] D. Jea, I. Yap and M. B. Srivastava. Context-aware access to public shared devices. In HealthNet, Page(s) 13-18, 2007.
  • [KK07] B.T. Korel and S.G.M. Koo, "Addressing Context Awareness Techniques in Body Sensor Networks", Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops, Page(s) 798-803, 2007.
  • [KO07] P. Kulkarni , Y. Ozturk , "Requirements and design spaces of mobile medical care", SIGMOBILE Mobile Computing and Communications Review, Volume 11 Issue 3, 2007.
  • [MGP07] K. Malhotra, S. Gardner and R. Patz, "Implementation of Elliptic-Curve Cryptography on Mobile Healthcare Devices" , Proceedings of IEEE International Conference on Networking, Sensing and Control, Page(s) 239-244, 2007.
  • [MSK07] M. Markovic, Z. Savic and B. Kovacevic, "Secure mobile health systems: principles and solutions", M-Health: Emerging Mobile Health Systems, Kluwer Academic Publishers, Page(s) 81-106, 2007.
  • [MW07] K. Malasri and L. Wang. Addressing security in medical sensor networks. In HealthNet, Page(s) 7-12, 2007
  • [P07] R. Pear, "Warning over Privacy of U.S. Health Network", New York Times, Feb. 2007.
  • [PHDS07] Liam Peyton, Jun Hu, Chintan Doshi and Pierre Seguin, "Addressing Privacy in a Federated Identity Management Network for E-Health", Eighth World Congress on the Management of eBusiness (WCMeB 2007).
  • [RGN07] Bernhard Riedl, Veronika Grascher and Thomas Neubauer, "Applying a Threshold Scheme to the Pseudonymization of Health Data", 13th IEEE International Symposium on Pacific Rim Dependable Computing, 2007.
  • [RNGBRK07] Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer and Alexander Krumboeck, "A secure architecture for the pseudonymization of medical data", Second International Conference on Availability, Reliability and Security (ARES'07).
  • [SDHH07] U. Srinivasan, G. Datta, M.S. Hons, and B.E. Hons, "Personal Health Record (PHR) in a Talisman: An Approach to Providing Continuity of Care in Developing Countries Using Existing Social Customs", E-Health Networking, Application and Services, 2007 9th International Conference on 19-22 June 2007 Page(s):277 - 279.
  • [SYZ07] N. Subramanian, C. Yang and W. Zhang, Securing Distributed Data Storage and Retrieval in Sensor Networks, IEEE PerCom '07, Page(s)191-200, 19-23 March 2007.
  • [V07] Upkar Varshney, "Pervasive healthcare and wireless health monitoring", Mobile Networks and Applications , Volume 12 Issue 2-3, 2007.
  • [VVM07] D.S. Venkateswarlu, K.S. Verma, and K.S.R. Murthy, "e Health networking to cater to Rural Health Care and Health Care for the Aged", E-Health Networking, Application and Services, 2007 9th International Conference on 19-22 June 2007 Page(s):273 - 276.
  • [YC07] W.D. Yu, and M.A. Chekhanovskiy, "An Electronic Health Record Content Protection System Using SmartCard and PMR", E-Health Networking, Application and Services, 2007 9th International Conference on 19-22 June 2007 Page(s):11 - 18.
  • [YJ07] W.D. Yu, and V. Jothiram, "Security in Wireless Mobile Technology for Healthcare Systems", E-Health Networking, Application and Services, 2007 9th International Conference on 19-22 June 2007 Page(s):308 - 311.
  • [ZMSW07] J. Zhang, L. Ma, W. Su, and Y. Wang, Privacy-Preserving Authentication Based on Short Group Signature in Vehicular Networks. ISDPE, 2007.

  • [AATC06a] W. Attiaoui, M.B. Ahmed, M. Tagina and B. Chetali, "Wrapping and Integrating USB Smart Card to Web Based Heterogeneous Medical Databases: Application for the Pathology of Cancer", Electrical and Computer Engineering, 2006. CCECE '06. Canadian Conference on May 2006, Page(s):1403 - 1408.
  • [AATC06b] W. Attiaoui, M.B. Ahmed, M. Tagina and B. Chetali, "Integrating USB Smart Card with Flash Memory to Web based Medical Information Systems: Application for the pathology of cancer", Information and Communication Technologies, 2006. ICTTA '06. 2nd Volume 1, 0-0 0 Page(s):971 - 977.
  • [ASCP06] S. Al-zharani; S. Sarasvady, H. Chandra and P. Pichappan, "Controlled EHR access in secured health information system", 1st International Conference on Digital Information Management, 6-6 Dec. 2006, Page(s):63 - 68.
  • [C06] R. Chakravorty, "A Programmable Service Architecture for Mobile Medical Care", Proc. 4th Annual IEEE International Conference on Pervasive Computing and Communications, 2006.
  • [DD06] C. Dong, and N. Dulay, "Privacy Preserving Trust Negotiation for Pervasive Healthcare", Pervasive Health Conference and Workshops, 2006 Nov. 29 2006-Dec. 1 2006 Page(s):1 - 9 .
  • [EWRRK06] K. Elmufti, D. Weerasinghe, M. Rajarajan, V. Rakocevic and S. Khan, "Privacy in Mobile Web Services eHealth", Pervasive Health Conference and Workshops 2006, Nov. 29 2006-Dec. 1 2006.
  • [FBBCSA06] A. Ferreira, L. Barreto, P. Brandao, R. Correia, S. Sargento, and L. Antunes, "A secure wireless architecture to access a virtual electronic patient record", Pervasive Health Conference and Workshops, 2006 Nov. 29 2006-Dec. 1 2006 Page(s):1 - 8.
  • [J06] Y. Jasemian, "Security and privacy in a wireless remote medical system for home healthcare purpose", Pervasive Health Conference and Workshops, 2006 Nov. 29 2006-Dec. 1 2006 Page(s):1 - 7.
  • [KBS06] J. Kim, A. R. Beresford and F. Stajano, "Towards a Security Policy for Ubiquitous Healthcare Systems", Proc. 1st International Conference on Ubiquitous Convergence Technology, Page(s) 263-272, 2006.
  • [MW06] K. Malasri and L. Wang, "SNAP: An Architecture for Secure Medical Sensor Networks", Wireless Mesh Networks, 2006. WiMesh 2006. Page(s): 160-162.
  • [PZB06] C.C.Y. Poon, Y. Zhang and S. Bao, A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health, IEEE Communications Magazine, vol.44, no.4, Page(s) 73-81, April 2006.
  • [RW06] P. Ray and J. Wimalasiri, "The Need for Technical Solutions for Maintaining the Privacy of EHR", in Proceedings 28th IEEE EMBS Annual International Conference, Page(s) 4686-4689, Sept. 2006.
  • [SCHC06] W. J. Song, M. K. Cho, I. S. Ha and M. K. Choi, "Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor Networks", Proc. 25th International Conference on Computer Safety, Reliability, and Security, Page(s) 233-246, 2006.
  • [STKM06] M. Shanmugam, S. Thiruvengadam, A. Khurat, and I. Maglogiannis, "Enabling Secure Mobile Access for Electronic Health Care Applications", Pervasive Health Conference and Workshops, 2006 Nov. 29 2006-Dec. 1 2006 Page(s):1 - 8.
  • [RW06] Pradeep Ray and Jaminda Wimalasiri, "The Need for Technical Solutions for Maintaining the Privacy of EHR" 28th IEEE EMBS Annual International Conference, New York City, USA, Aug 30-Sept 3, 2006.
  • [VK06] K.K. Venkatasubramanian and S.K.S. Gupta, "Security for pervasive health monitoring sensor applications", in Proc. 4th International Conference on Intelligent Sensing and Information Processing 2006 - ICISIP 2006, Page(s) 197-202, Bangalore, India, Dec. 2006.
  • [WERR06] D. Weerasinghe, K. Elmufti, M. Rajarajan, and V. Rakocevic, "XML Security based Access Control for Healthcare Information in Mobile Environment", Pervasive Health Conference and Workshops, 2006 Nov. 29 2006-Dec. 1 2006 Page(s):1 - 6.
  • [XSSC06] Y. Xiao, X. Shen, B. Sun and L. Cai, "Security and Privacy in RFID and Applications in Telemedicine", IEEE Communication Magazine, 2006.
  • [YKS06] G. Yee, L. Korba and R. Song, "Ensuring Privacy for E-Health Services", Proceedings of the First International Conference on Availability, Reliability and Security (ARES'06), 2006.


2005 -- Before
  • [AS02] G.Ahn and D. Shin, "Towards Scalable Authentication in Health Services", Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02).
  • [B01] B. Blobel, "Trustworthiness in Distributed Electronic Healthcare Records - Basis for Shared Care", Computer Security Applications Conference, 2001, Proceedings 17th Annual, 10-14 Dec. 2001.
  • [BZS05] S. Bao, Y. Zhang and L. Shen, "Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems", Proc. 27th Annual International Conference of Engineering in Medicine and Biology Society, Page(s) 2455-2458, 2005.
  • [DD05] L. Demuynck and B. D. Decker. Privacy-Preserving Electronic Health Records. In Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference (CMS 2005), volume 3677 of LNCS, pages 150-159. Springer-Verlag, 2005.
  • [GR98] P. Ganguly and P. Ray, "Telemedicine over enterprise-wide networks: a case study", Proc. IEEE Global Telecommunications Conference (GLOBALCOM), Page(s) 1297-1302, 1998.
  • [K05] Y. S. Kwak, "International standards for building Electronic Health Record (EHR)", Enterprise networking and Computing in Healthcare Industry, 2005. HEALTHCOM 2005. Proceedings of 7th International Workshop on 23-25 June 2005 Page(s):335 - 338.
  • [LJKK05] K. Lee, Z. Jiang, S. Kim, and S. Kim, "Security policy management for healthcare system network", Enterprise networking and Computing in Healthcare Industry, 2005. HEALTHCOM 2005. Proceedings of 7th International Workshop on 23-25 June 2005 Page(s):289 - 292
  • [MDP04] R. Marti, J. Delgado and X. Perramon, "Network and Application Security in Mobile e-Health Applications", Proc. International Conference on Networking Technologies for Broadband and Mobile Networks, Page(s) 995-1004, 2004.
  • [MJWM04] D. Malan, T. F. Jones, M. Welsh and S. Moulton. "CodeBlue: An ad hoc sensor network infrastructure for emergency medical care", In Proc. MobiSys 2004 Workshop on Applications of Mobile Embedded Systems (WAMES 2004), June 2004.
  • [MWS04] D. J. Malan, M. Welsh and M. D. Smith, "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography", Proc. The First IEEE International Conference on Sensor and Ad hoc Communications and Networks (SECON), Santa Clara, CA, October 2004.
  • [RMK04] J. Rekimoto, T. Miyaki and M. Kohno, "ProxNet: Secure DynamicWireless Connection by Proximity Sensing", 2nd conference on pervasive computing (Pervasive 2004), Vienna, In LNCS. Springer, Berlin Heidelberg New York, pp 213-218.
  • [S03] G. M. Stevens, "A Brief Summary of the Medical Privacy Rule", CRS Report for Congress, 2003.
  • [SCLJW05] V. Shnayder, B. Chen, K. Lorincz, T. Jones and M. Welsh, "Sensor Networks for Medical Care", Technical Report TR-08-05, Division of Engineering and Applied Sciences, Harvard University, 2005.
  • [SCSHCSVATO03] N. Stathiakis, C. E. Chronakil, E. Skipenes, E. Henriksen, E. Charalambus, A. Sykianakis, G. Vrouchos, N. Antonakis, M. Tsiknakisl S. Orphanoudakisl, "Risk Assessment of a Cardiology eHealth Service in HYGEIAnet", Computers in Cardiology 2003, 21-24 Sept. 2003.
  • [TFR06] M. Tentori, J. Favela and M. D. Rodriguez, "Privacy-Aware Autonomous Agents for Pervasive Healthcare", IEEE Intelligent Systems, Vol. 22, Page(s) 55-62, 2006.
  • [WRW05] J.S. Wimalasiri, P. Ray, and C.S. Wilson, "Security of electronic health records based on Web services", Enterprise networking and Computing in Healthcare Industry, 2005. HEALTHCOM 2005. Proceedings of 7th International Workshop on 23-25 June 2005 Page(s):91 - 95
  • [YK05] G. Yee and L. Korba, "An Agent Architecture for E-Services Privacy Policy Compliance", Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA'05).
 

Last update: Copyright ©2009-2010, Xiaohui Liang