|
[1]Mildon J. and Cohen T., “Drivers in the Electronic Medical Records Market,” Health Management Technology, Vol. 22, No. 5, pp. 14-16, 2001. [2]Institute Of Medicine , The National Academies, “Key Capabilities of an Electronic Health Record System,”, Washington, DC: National Academy Press, July, 2003. [3]Yamazaki, S. and Y. Satomura, “Standard Method for Describing an Electronic Patient Record Template: Application of XML to Share Domain Knowledge,” Methods of Information in Medicine, pp. 50-55, 2000. [4]K.A. Kuhn and D.A. Giuse, “From Hospital Information Systems to Health Information Systems,” Problems, challenges, perspectives, Methods of Information in Medicine, Vol. 40, No. 4, pp. 275-287, 2001. [5]R. Haux, “Health Information Systems—Past, Present, Future,” International Journal of Medical Informatics, Vol. 75, pp. 268-281, 2006. [6]S.J. Dwyer III, “A Personalized View of the History of PACS in the USA,” In Medical Imaging 2000: PACS Design and Evaluation: Engineering and Clinical Issues, G. James Blame, Eliot L. Siegel, Editors, Proceedings of SPIE, Vol. 3980, pp. 2-9, 2000. [7]K. Kahl, L. Irancin and M. Fuhrmann, “Automated Nursing Documentation System Provides a Favorable Return on Investment,” The Journal of nursing administration, Vol. 21, No. 11, pp. 44-51, 1991. [8]Vagelatos, A. and Sarivougioukas, J. “Lessons Learned from the Introduction of a Laboratory Information Systems in a State Hospital of Athens, Greece,” 36th Hawaii International Conference on System Sciences HICSS, USA, 2003. [9]Thomas R. Brown, Handbook of institutional pharmacy practice, 4th Edition, American Society of Health-System Pharmacists, 2006. [10]N. M. Karnik and A. R. Tripathi, “Design Issues in Mobile-Agent Programming Systems.” IEEE Concurrency, Vol.6, No. 3, pp. 52-61, 1998. [11]V. A. Pham and A. Karmouch, “Mobile Software Agents: An Overview,” IEEE Communications Magazine, Vol.36, No.7, pp. 26-37, 1998. [12]N. Borselius, “Mobile Agent Security,” Electronics & Communication Engineering Journal, Vol. 14, No. 5, pp. 211-218, 2002. [13]C. Garrigues, S. Robles and J. Borrell, G. Navarro-Arribas “Promoting the Development of Secure Mobile Agent Applications,” Journal of Systems and Software (JSS), Vol. 83, No. 6, pp. 959-971, 2010. [14]N.R. Jennigs, K. Sycara and M. Wooldridge, “A Roadmap of Agent Research and Development,” Autonomous Agents and Multi-Agent Systems, Vol. 1, No. 1, pp. 7-38, 1998. [15]Y.F. Chung, T.S. Chen and M.W. Lai, “Efficient Migration Access Control for Mobile Agents,” Computer Standards & Interfaces, Vol. 31, No. 6, pp. 1061-1068, 2009. [16]D. B. Lange and M. Oshima, “Seven Good Reasons for Mobile Agents,” Communication of The ACM, Vol. 42, No. 3, pp. 88-89, 1999. [17]N. R. Jennings and M. Wooldridge, “Applications of Intelligent Agents,” Agent Technology Foundations, Applications and Markets, 1998. [18]M. G. Geruti, “Mobile Agents in Network-Centric Warfare,” International Symposium Autonomous Decentralized Systems, pp. 243-246, 2001. [19]NIST (National Institute of Standards and Technology) 1995. An Introduction to Computer Security: The NIST Handbook. (Special Publication 800-12). [20]Taxonomy of Threats and Security Services for Information Systems, Gulachenski and Cost, (Working paper: Project No.:8353Z, Contract No.:DAAB07-94-C-H601), MITRE, 1994. [21]N.L. Snee and K.A. McCormick, “The Case for Integrating Public Health Informatics Networks,” Engineering in Medicine and Biology Magazine, Vol. 23, No. 1, pp. 81-88, 2004. [22]D.E. Detmer, “Building the National Health Information Infrastructure for Personal Health, Health Care Services, Public Health and Research,” BMC Medical Informatics and Decision Making, Vol. 3, No. 1, 2003. [23]M. Shepherd, “Challenges in Health Informatics,” The 40th Annual Hawaii International Conference on System Sciences, pp. 135, 2007. [24]ISO TS 17090 Health Informatics, Public key infrastructure, Part 1, framework and overview, Part 2, certification profiles, Part 3, policy management of certification authority (revised towards an ISO standards by ISO TC 215 WG 4 in 2004). [25]P. Povalej, M. Leni, M. Zoman, P. Kokol and D. Dinevski, “Accuracy of Intelligent Medical Systems,” Computer Methods and Programs in Biomedicine, Vol. 80, pp. S95-S105, 2005. [26]“NIST - Guide to Intrusion Detection and Prevention Systems (IDPS).” 2007-02. Retrieved 2010-06-25. [27]Robert C. Newman, “Computer Security: Protecting Digital Resources,” Jones & Bartlett Learning. pp. 273-274. ISBN 9780763759940. Retrieved 25 June 2010. [28]Idaho National Laboratory, “Control System Cyber Security: Defense in Depth Strategies”, Control Systems Security Center, U.S. Department of Homeland Security, May 2006. [29]C.H. Liu, Y.F. Chung, T.S. Chen and S.D. Wang, “The Enhancement of Security in Healthcare Information System,” Journal of medical systems, 2010. [30]D. E. Gobuty, “Defending Medical Information Systems Against Malicious Software,” International Congress Series, Vol. 1268, pp. 96-107, 2004.
|