Sciweavers

10 search results - page 1 / 2
» Ubiquitous healthcare: do we want it
Sort
View
BCSHCI
2008
13 years 6 months ago
Ubiquitous healthcare: do we want it?
In this paper we describe the development and test of a futuristic health scenario that allows the seamless exchange of sensitive personal data. The scenario was used to elicit us...
Linda Little, Pamela Briggs
ER
2007
Springer
138views Database» more  ER 2007»
13 years 6 months ago
Model-Driven Development Based Transformation of Stereotyped Class Diagrams to XML Schemas in a Healthcare Context
The health sector uses clinical guidelines as instruments for helping decision making. We are interested in the development of a ubiquitous decision support system (UDSS) for clini...
Eladio Domínguez, Jorge Lloret, Beatriz P&e...
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 6 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
EUSAI
2004
Springer
13 years 10 months ago
Remote Code Execution on Ubiquitous Mobile Applications
Today, most mobile devices (e.g. PDAs) are in some way associated to a fixed personal computer or server. In general this relation is only taken into account for synchronization p...
João Nuno Silva, Paulo Ferreira
RTCSA
2007
IEEE
13 years 11 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...