Norris, A. C., Essentials of Telemedicine and Telecare. Wiley Press, Chichester, 2002.
Google Scholar
Charles, B. L., Telemedicine can lower costs and improve access. Healthc. Financ. Manag. 54(4), Oak Brook, Ill.: The Healthcare Financial Management Association, pp. 66–69, 2000.
Google Scholar
Field, M. J. (Ed.), Telemedicine: A Guide to Assessing Telecommunications in Health Care. National Academy Press, Washington, D.C, p. 26, 1996.
Google Scholar
Martin, E., Military Healthcare Service System. Proceedings of the AFEC, 1996.
Fakas, G. J., and Karakostas, B., A peer to peer architecture for dynamic workflow management. Proc. Elsevier Inf. Softw. Technol. 46:423–431, 2004.
Article
Google Scholar
Sameh, A., and Fakhry, D., Security in Mobile Agent Systems. Proceedings of the 2002 Symposium on Applications and the Internet (SAINT '02), pp. 4–5.
Reina-Tosina, J., Roa, L., and Rovayo, M., NEWBET: Telemedicine platform for burn patients. IEEE Trans. Inf. Technol. Biomed. 4(2):173–177, 2000.
Koutkias, V. G., Chouvarda, I., and Maglaveras, N., A multiagent system enhancing home-care health services for chronic disease management. IEEE Trans. Inf. Technol. Biomed. 9(4):528–537, 2005.
Google Scholar
Pang, X., Catania, B., and Tan, K. L., Securing Your Data in Agent-Based P2P Systems. Proceedings of the Eighth International Conference on Database System for Advanced Applications(DASFAA’03).
Li, T. Y., Zhao, Z. G., and You, S. Z., A-Peer: An Agent Platform Integrating Peer-to-Peer Network. Proceedings of the 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID’03).
Hohl, F., Time limited black box security: Protecting mobile agents from malicious hosts. Lect. Notes Comput. Sci. 1419: 92-113, 1998.
Google Scholar
Borselius N., Mobile agent security. Electron. Commun. Eng. J. 14(5):211–218, 2002.
Google Scholar
Davidson, A., P2P File Sharing Privacy and Security, Testimony before the House Committee on Government Reform Center for Democracy and Technology, May 2003.
Balfe, S., Lakhani, A. D., and Paterson, K. G., Trusted computing: providing security for peer-to-peer networks. Proceedings of the 15th IEEE International Conference Peer-to-Peer Computing, Aug.-2 Sept. 2005, pp. 117–124.
Sander, T., and Tschudin, C. F., Protecting mobile agents against malicious hosts. Proceeding of Mobile Agents and Security, 1998, pp. 44–60.
Aberer, K., Datta, A., and Hauswirth, M., Efficient, self-contained handling of identity in peer-to-peer systems. IEEE Trans. Knowl. Data Eng. 16(7):858–869, 2004.
Article
Google Scholar
Mea, V. D., Agents acting and moving in healthcare scenario―a paradigm for telemedical collaboration. IEEE Trans. Inf. Technol. Biomed. 5(1):10–13, 2001.
Google Scholar
Chen, R. Y., and Yeager, B., Java Mobile Agents on Project JXTA Peer-to-Peer Platform. Proceedings of the 36th Hawaii International Conference on System Sciences(HICSS’03), 2003.
Kotzanikolaou, P., Burnester, M., and Chrissikopoulos, V., Secure transactions with mobile agents in hostile environments. Lect. Notes Comput. Sci. 1841:289–297, 2000.
Google Scholar
Ng, W. S., Ooi, B. C., Tan, K. L., and Zhou, A., PeerDB: A P2P-Based System for Distributed Data Sharing. Proceedings of the 19th International Conference Data Engineering, pp. 633–644, March 2003.
Li, Z., Dong, Y., Zhuang, L., and Huang, J., Implementation of Secure Peer Group in Peer-to-Peer Network. Proceedings of ICCT2003, 2003.
Yu,C. R., and Bill, Y., Java Mobile Agents on Project JXTA Peer-to-Peer Platform. Proceedings of the 36th Hawaii International Conference on System Sciences(HICSS’03).
William, Y., and Williams, J., Secure Peer-to-Peer Networking: The JXTA Example, Proceedings. 2002 IEEE 1520-9202, March |April 2002, pp. 53–57.
Pank, Z. W., Lee, J. H., and Kim, M. K., Design of Security Functionality in P2P Applications. Proceedings of the 8th Russian-Korean International Symposium, Science and Technology, Vol. 1, 26 June-3 July 2004, pp. 132–136.