Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Medical services
biblio
The Impact of First Impressions on Human- Robot Trust During Problem-Solving Scenarios
Submitted by grigby1 on Tue, 12/01/2020 - 1:33pm
Primacy Effect
working robot
Task Analysis
robust trust
robotics
Resiliency
resilience
pubcrawl
problem-solving situation
problem-solving scenarios
Problem-solving
problem solving
Robot Trust
multi-robot systems
Medical services
Humanoid robots
humanoid robot
human-robot trust
human-robot interaction
Human Factors
human environments
Human behavior
Games
faulty robot behavior
biblio
Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements
Submitted by aekwall on Mon, 11/09/2020 - 1:20pm
OpenEMR
digital versions
EHR applications
Electronic Health Record applications
Health Information Technology certification criteria
Health Insurance Portability
HIPAA Compliance
HIPAA technical requirements
ONC certification
ONC criteria
open source EHR applications
convenient access
paper-based patient
patient medication
patient treatment plans
precise medical decision-making process
privacy criteria
Privacy Requirements
regulatory requirements
security risks
static code analysis-based vulnerability
Information Reuse and Security
static analysis
Servers
data privacy
electronic health records
Medical services
security
Resiliency
pubcrawl
privacy
tools
open source tools
security of data
security vulnerabilities
health care
security issues
Compositionality
certification
adopted EHR application
certification compliance
clinic visits
compliance checking
biblio
The Roles of E-Government in Healthcare from the Perspective of Structuration Theory
Submitted by grigby1 on Fri, 10/16/2020 - 11:23am
Lenses
Trajectory
structuration theory
security
Resiliency
resilience
qualitative methods
public administration
pubcrawl
policy-based governance
Medical services
collaboration
information technology
healthcare services
Healthcare
health care
government policies
Electronic government
e-government concept
E-Government
data analysis
Cybersecurity
biblio
SDN\_Based Secure Healthcare Monitoring System(SDN-SHMS)
Submitted by aekwall on Mon, 10/12/2020 - 11:32am
Biomedical monitoring
Expert Systems and Privacy
security platform
security integration framework
secure Healthcare Monitoring System
SDN-SHMS
IoT-based remote health monitoring systems
IoT-based healthcare monitoring systems
HMS
geriatrics
elderly people
security concern
biomedical communication
privacy concern
patient monitoring
medical computing
Monitoring
Software Defined Network
health care
Human Factors
sensors
Mobile Applications
pubcrawl
Human behavior
software defined networking
computer architecture
security
Internet of Things
Medical services
data privacy
Scalability
biblio
Mobile Transaction Processing for a Distributed War Environment
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
resilience
medical units
message transaction technique
Metrics
Microprocessors
military computing
mobile computing
mobile transaction processing
natural environment
optimistic concurrency control protocol
Processing time
Protocols
pubcrawl
Medical services
Resiliency
Sagas
security
serializability
Servers
Shadow paging
timely decisions
top-level commanders
transaction
transaction processing
transaction techniques
wounded soldiers
Databases
ambulance staff
battlefield environment
battlefield need
caching
Compensation Workflow
composability
computer architecture
Concurrency
concurrency control
CPS
cyber physical systems
database management systems
Actionability rules
Decision Making
distributed war environment
field hospital staff
health care
hospitals
incoming injured soldiers
irregular communications
medical authorities
medical information
medical information systems
medical service unit transactional workflow technique
biblio
Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
innovative cognitive cybersecurity
health care
Healthcare
healthcare ecosystem
Human behavior
Human Behavior and Cybersecurity
human cognitive behaviour
Human Factors
human life
infrastructures
emerging cybersecurity
Internet of Things
machine learning
Medical services
privacy
Privacy Threats
pubcrawl
security of data
sophisticated attack methods
computer security
Adaptation models
Artificial Intelligence
artificial intelligent
cognition
Cognitive cybersecurity
cognitive cybersecurity framework
cognitive methods
cognitive techniques
CPS Privacy
CPS-IoT
CPS-IoT enabled healthcare services
critical infrastructure systems
critical infrastructures
cyber physical systems
cyber-attacks
cybersecurity specialists
data privacy
biblio
Supporting Privacy in a Cloud-Based Health Information System by Means of Fuzzy Conditional Identity-Based Proxy Re-encryption (FCI-PRE)
Submitted by aekwall on Mon, 09/28/2020 - 11:55am
Public key
Computing Theory and Privacy
Proxy Re Encryption
nonnegligible privacy issues
medical documents
identity based encryption
Health Information Systems
fuzzy conditional identity-based proxy re-encryption
FCI-PRE
electronic medical records
data-intensive domain
cloud-based health information system
healthcare providers
health care
Cloud Computing
fuzzy set theory
privacy
pubcrawl
Human behavior
Resiliency
Medical services
electronic health records
data privacy
Access Control
encryption
Cryptography
Scalability
biblio
Access Control for Electronic Health Records with Hybrid Blockchain-Edge Architecture
Submitted by aekwall on Mon, 09/28/2020 - 11:42am
medical information systems
off-chain edge nodes
hyperledger composer fabric blockchain
hybrid blockchain-edge architecture
hybrid architecture
global electronic health record market
EHR privacy
EHR data management
blockchain-based controller
blockchain-based access control logs
access control policies
Access Control List
distributed ledger
transaction processing
Fabrics
edge computing
Scalability
health care
blockchain security
hyperledger
smart contracts
Distributed databases
smart contract
blockchain
pubcrawl
Resiliency
computer architecture
Medical services
data privacy
Access Control
authorisation
attribute-based access control
biblio
Trust Evaluation Strategy Based on Grey System Theory for Medical Big Data
Submitted by aekwall on Mon, 09/21/2020 - 3:39pm
Medical diagnostic imaging
Computer Theory and Trust
trust gray evaluation model
trust evaluation weight system
trust evaluation strategy
trust evaluation index weight
trust evaluation
traditional evaluation method
Medical Big Data
grey systems
grey system theory
evaluation process
decision fuzzy
analytic hierarchy process (AHP)
AHP method
Access Control
Sensitivity
Compositionality
medical information systems
analytic hierarchy process
statistical analysis
Indexes
fuzzy set theory
privacy
composability
pubcrawl
Task Analysis
Medical services
Big Data
biblio
Secure Pattern-Based Data Sensitivity Framework for Big Data in Healthcare
Submitted by grigby1 on Fri, 08/28/2020 - 3:34pm
resilience
big data security in the cloud
special big data analytics methods
Sensitivity
sensitive information protection
secure pattern-based data sensitivity framework
patient data
healthcare data
Hadoop distributed file system
Hadoop
Elliptic curves
electronic medical records
data frequency
big data technologies
Scalability
information retrieval
Cryptography
electronic health records
Metrics
parallel processing
Data protection
Big Data
health care
Medical services
Access Control
Resiliency
pubcrawl
Distributed databases
data analysis
security
learning (artificial intelligence)
encryption
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »