Augmenting security and accountability within the eHealth Exchange.
Musheer AhmedMustaque AhamadTushar JaiswalPublished in: IBM J. Res. Dev. (2014)
Keyphrases
- information security
- intrusion detection
- security requirements
- computer security
- security issues
- information assurance
- access control
- network security
- information exchange
- statistical databases
- security vulnerabilities
- security model
- share information
- real time
- trusted third party
- security services
- security management
- security threats
- security problems
- security level
- security systems
- data integrity
- security analysis
- data sets
- key management
- security mechanisms
- data mining
- personal information