{"id":"https://openalex.org/W2122942631","doi":"https://doi.org/10.1109/iceei.2011.6021580","title":"Enhancing security in E-health services using agent","display_name":"Enhancing security in E-health services using agent","publication_year":2011,"publication_date":"2011-07-01","ids":{"openalex":"https://openalex.org/W2122942631","doi":"https://doi.org/10.1109/iceei.2011.6021580","mag":"2122942631"},"language":"en","primary_location":{"id":"doi:10.1109/iceei.2011.6021580","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iceei.2011.6021580","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 International Conference on Electrical Engineering and Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056205231","display_name":"Rossilawati Sulaiman","orcid":"https://orcid.org/0000-0002-4049-5939"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]},{"id":"https://openalex.org/I4210114742","display_name":"National Institutes of Biotechnology Malaysia","ror":"https://ror.org/029dygd35","country_code":"MY","type":"government","lineage":["https://openalex.org/I134138859","https://openalex.org/I4210114742"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Rossilawati Sulaiman","raw_affiliation_strings":["School of Computer Science, Faculty of Information Science and Technology, National University of Malaysia, Selangor, Malaysia","School of Computer Science, Faculty of Information Science and Technology, National University of Malaysia, 43600, Selangor, Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Faculty of Information Science and Technology, National University of Malaysia, Selangor, Malaysia","institution_ids":["https://openalex.org/I4210114742","https://openalex.org/I885383172"]},{"raw_affiliation_string":"School of Computer Science, Faculty of Information Science and Technology, National University of Malaysia, 43600, Selangor, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087977913","display_name":"Dharmendra Sharma","orcid":"https://orcid.org/0000-0002-9856-4685"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dharmendra Sharma","raw_affiliation_strings":["Faculty of Information Science and Engineering, University of Canberra, Bruce, Australia","Faculty of Information Science and Engineering, University of Canberra, Kirinari St, Bruce, ACT 2601, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Science and Engineering, University of Canberra, Bruce, Australia","institution_ids":["https://openalex.org/I188329596"]},{"raw_affiliation_string":"Faculty of Information Science and Engineering, University of Canberra, Kirinari St, Bruce, ACT 2601, Australia","institution_ids":["https://openalex.org/I188329596"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5056205231"],"corresponding_institution_ids":["https://openalex.org/I4210114742","https://openalex.org/I885383172"],"apc_list":null,"apc_paid":null,"fwci":0.7002,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.73634625,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"19","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7648651599884033},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7584334015846252},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5586748123168945},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.514719545841217},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.5122546553611755},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.4764809310436249},{"id":"https://openalex.org/keywords/mobile-agent","display_name":"Mobile agent","score":0.44843074679374695},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43707039952278137},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.42239809036254883},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3384133577346802},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3283592462539673},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.231594055891037},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19548338651657104}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7648651599884033},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7584334015846252},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5586748123168945},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.514719545841217},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.5122546553611755},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.4764809310436249},{"id":"https://openalex.org/C84875433","wikidata":"https://www.wikidata.org/wiki/Q3277848","display_name":"Mobile agent","level":2,"score":0.44843074679374695},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43707039952278137},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.42239809036254883},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3384133577346802},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3283592462539673},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.231594055891037},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19548338651657104}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iceei.2011.6021580","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iceei.2011.6021580","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 International Conference on Electrical Engineering and Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W136245672","https://openalex.org/W163833140","https://openalex.org/W197735338","https://openalex.org/W1826987073","https://openalex.org/W1901196806","https://openalex.org/W1904065432","https://openalex.org/W1911281779","https://openalex.org/W1982453322","https://openalex.org/W2025332121","https://openalex.org/W2030677354","https://openalex.org/W2092747249","https://openalex.org/W2095649376","https://openalex.org/W2106490520","https://openalex.org/W2107419595","https://openalex.org/W2119471769","https://openalex.org/W2126359055","https://openalex.org/W2129899354","https://openalex.org/W2133760503","https://openalex.org/W2144158661","https://openalex.org/W2147492008","https://openalex.org/W2155012663","https://openalex.org/W2164718732","https://openalex.org/W2170051340","https://openalex.org/W2215431421","https://openalex.org/W2615688110","https://openalex.org/W4285719527","https://openalex.org/W4292404994","https://openalex.org/W6605593766","https://openalex.org/W6606620550","https://openalex.org/W6640096140","https://openalex.org/W6673936176","https://openalex.org/W6676082352","https://openalex.org/W6684347218"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2778153218","https://openalex.org/W1531601525","https://openalex.org/W2033357182","https://openalex.org/W2735050489","https://openalex.org/W64368977","https://openalex.org/W2800653357","https://openalex.org/W147109933"],"abstract_inverted_index":{"Electronic":[0],"health":[1],"(or":[2],"e-health)":[3],"and":[4,22,37,55,80,108,126,158,235,263],"any":[5],"other":[6],"e-services":[7],"use":[8],"the":[9,18,56,100,113,146,163,182,197,201,210,215,221,237,243,247,250,257,260,264,268,279],"Internet":[10,19,46],"to":[11,45,52,70,82,104,116,138,144,152,156,168,180,192,200,208,255,278],"enhance":[12,159],"healthcare":[13],"service":[14],"deliveries.":[15],"However,":[16,86],"while":[17,87],"greatly":[20,91],"facilitates":[21],"enhances":[23],"these":[24,88],"services,":[25],"significant":[26],"threats":[27,44],"also":[28],"come":[29],"in":[30,132,162,172,239],"parallel.":[31],"Network":[32],"attacks,":[33],"information":[34],"privacy":[35],"breaches,":[36],"malicious":[38],"software":[39],"are":[40,103,176,187,206],"common":[41],"types":[42],"of":[43,123,148,223,241,249,267],"communication,":[47],"which":[48,102],"can":[49,245],"cause":[50],"damage":[51],"computer":[53],"systems":[54],"information.":[57],"It":[58],"is":[59,64],"imperative":[60],"that":[61,273],"online":[62],"communication":[63,130],"secure.":[65],"Many":[66],"security":[67,93,114,124,160,183],"mechanisms":[68,89],"exist":[69],"secure":[71,169,209],"e-services,":[72],"such":[73,135],"as":[74,136,189,212,214],"authentication,":[75],"data":[76,84,195,211],"integrity,":[77],"non":[78],"repudiation,":[79],"SSL":[81],"provide":[83,92,105,153],"confidentiality.":[85],"have":[90],"protection,":[94],"they":[95],"do":[96],"not":[97],"cater":[98],"for":[99,112,128],"requirements,":[101],"an":[106],"automated":[107],"a":[109],"flexible":[110],"way":[111],"system":[115,150],"handle":[117,157,181],"(1)":[118],"end":[119],"users":[120,131],"with":[121,178,229],"lack":[122],"knowledge,":[125],"(2)":[127],"two":[129],"different":[133],"environments,":[134],"PC":[137],"PDA":[139],"communications.":[140],"This":[141],"paper":[142],"aims":[143],"present":[145],"advantages":[147,276],"multi-agent":[149],"(MAS)":[151],"better":[154],"techniques":[155],"processes":[161],"traditional":[164,225],"non-agent":[165,226,280],"based":[166,227,281],"systems,":[167],"services":[170],"particularly":[171],"e-health.":[173],"The":[174],"agents":[175,186,253],"skilled":[177],"knowledge":[179],"processes.":[184],"Mobile":[185],"used":[188,207],"supporting":[190],"tools":[191],"carry":[193],"sensitive":[194],"from":[196],"Sender's":[198],"side":[199],"Recipient's":[202],"side.":[203],"Cryptographic":[204],"protocols":[205],"well":[213],"mobile":[216],"agent":[217,244],"code.":[218,270],"We":[219,271],"compare":[220,277],"architectures":[222],"both":[224],"approach":[228,232],"our":[230],"agent-based":[231],"(called":[233],"MAgSeM)":[234],"analyze":[236],"results":[238],"terms":[240],"how":[242,252],"support":[246],"automation":[248],"process,":[251],"help":[254],"reduce":[256],"burden":[258],"on":[259],"recipient":[261],"side,":[262],"reusable":[265],"characteristic":[266],"agent's":[269],"conclude":[272],"MAgSeM":[274],"has":[275],"approach.":[282]},"counts_by_year":[{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
