Blockchain Use Cases in Digital Sectors: A Review of the Literature S Al-Megren, S Alsalamah, L Altoaimy, H Alsalamah, L Soltanisehat, ... The 2018 IEEE International Conference on Blockchain (Blockchain-2018), 1417 …, 2018 | 43 | 2018 |
Healthybroker: A trustworthy blockchain-based multi-cloud broker for patient-centered ehealth services H Kurdi, S Alsalamah, A Alatawi, S Alfaraj, L Altoaimy, SH Ahmed Electronics 8 (6), 602, 2019 | 42 | 2019 |
A QoS-Aware and Energy-Efficient Genetic Algorithm for Resource Allocation in Cloud Data Centers. Maha Bakalla, Hadeel Al-Jami, Heba Kurdi, Shada Alsalamah The 9th International Congress on Ultra Modern Telecommunications and …, 2017 | 21* | 2017 |
Machine learning for health: algorithm auditing & quality control L Oala, AG Murchison, P Balachandran, S Choudhary, J Fehr, AW Leite, ... Journal of medical systems 45, 1-8, 2021 | 15 | 2021 |
TrustyFeer: A Subjective Logic Trust Model For Smart City Peer-to-Peer Federated Clouds. Heba Kurdi, B. Alshayban, Lina Altoaimy, Shada Alsalamah Wireless Communications and Mobile Computing 2018 (Article ID 1073216), 13 pages, 2018 | 15 | 2018 |
Information security requirements in patient-centred healthcare supporting systems Shada Alsalamah, Alex Gray, Jeremy Hilton, Hessah Alsalamah IOS Press 192, 812-816, 2013 | 14* | 2013 |
Information Security Threats in Patient-Centred Healthcare. Shada Alsalamah, Hessah Alsalamah, Alex Gray, Jeremy Hilton Health Care Delivery and Clinical Science: Concepts, Methodologies, Tools …, 2018 | 9 | 2018 |
Information Security Threats in Patient-Centred Healthcare S Alsalamah, H Alsalamah, AW Gray, J Hilton M-Health Innovations for Patient-Centered Care, 298-318, 2016 | 9 | 2016 |
Promising blockchain technology applications and use case designs for the identification of multinational victims of mass disasters S Alsalamah, E Nuzzolese Frontiers in Blockchain, 34, 2020 | 8 | 2020 |
Towards a unified blockchain-based dental record ecosystem for disaster victims identification S AlQahtani, S Alsalamah, A Alimam, A AlAdullatif, M AlAmri, M AlThaqeb, ... Proceedings of the 5th International Conference on Health Informatics and …, 2019 | 7 | 2019 |
Access control model for modern virtual e-government services: Saudi Arabian case study R Albrahim, H Alsalamah, S Alsalamah, M Aksoy International Journal of Advanced Computer Science and Applications 9 (8 …, 2018 | 7 | 2018 |
HealthyBlockchain for global patients SA Alsalamah, HA Alsalamah, T Nouh, SA Alsalamah CMC-COMPUTERS MATERIALS & CONTINUA 68 (2), 2431-2449, 2021 | 4 | 2021 |
Information Requirements for Disaster Victim Identification and Emergency Medical Services: Hajj Crowd Disaster Case Study. Shada Alsalamah, Hessah Alsalamah, Jaziar Radianti, Sakher Alqahtani, Thamer ... In: Community Engineering & Healthcare Systems Proceedings of the 15th …, 2018 | 4* | 2018 |
Information Classification Scheme for Next Generation Access Control Models in Mobile Patient-Centered Care Systems Shada Alsalamah ICMLG 2017 5th International Conference on Management Leadership and …, 2017 | 4 | 2017 |
Sharing patient medical information among healthcare team members while sustaining information security Shada Alsalamah, Alex Gray, Jeremy Hilton University of Zurich, 2011 | 4 | 2011 |
Towards persistent control over shared information in a collaborative environment Shada Alsalamah, Alex Gray, Jeremy Hilton Proc 6th Inter Conf Information Warfare and Security (ICIW). Washington, DC …, 2011 | 4 | 2011 |
Towards information sharing in virtual organisations: The development of an icon-based information control model Shada Alsalamah, Jeremy Hilton, Pete Burnap | 4 | 2010 |
Wholesome Coin: A PHealth Solution to Reduce High Obesity Rates in Gulf Cooperation Council Countries Using Cryptocurrency HA Alsalamah, S Nasser, S Alsalamah, AI Almohana, A Alanazi, ... Frontiers in Blockchain 4, 654539, 2021 | 3 | 2021 |
A credit-based approach for overcoming free-riding behaviour in peer-to-peer networks M Hazazi, A Almousa, H Kurdi, S Al-Megren, S Alsalamah Comput. Mater. Continua 59 (1), 15-29, 2019 | 3 | 2019 |
Securing health applications using loTsecM security modelling: Dentify. Me app case study for urgent care management PJE Ambrosio, DR Ramírez, S Alsalamah, T Tryfonas, SO Jiménez, ... Comput. Sistemas 23 (4), 1139-1158, 2019 | 2 | 2019 |