注册
/
登录
高级搜索
开启搜索历史记录
删除搜索历史记录.
搜索历史记录选项已关闭,请开启搜索历史记录选项。
我的图书馆
Your browser does not support JavaScript, or it is disabled. JavaScript must be enabled in order to view listings.
Communicating security policies to trusted e-health information systems: a specification process based approach
作者: V Lakshmi Narasimhan , PR Croll , None
DOI:
关键词:
摘要:
保存
引用
反馈
分享
想要
索引来源
0
下载资源
1
acm.org
UNKNOWN
下载加速
参考文章
(13)
1.
Frédéric Cuppens,
An Epistemic and Deontic Logic for Reasoning about Computer Security.
european symposium on research in computer security.
pp. 135- 145 ,(1990)
2.
Peter A. Loscocco, Stephen D. Smalley,
Meeting Critical Security Objectives with Security-Enhanced Linux
,(2001)
3.
John F. Farrell, S. Jeff Turner, Peter A. Loscocco, Ruth C. Taylor, Stephen D. Smalley, Patrick A. Muckelbauer,
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments
,(2000)
4.
M. Bhide, A. Gupta, M. Joshi, M. Mohania, S. Raman,
Policy framework for automatic data management
international conference on autonomic computing.
pp. 336- 337 ,(2004) ,
10.1109/ICAC.2004.1301403
5.
J.O. Kephart, D.M. Chess,
The vision of autonomic computing
IEEE Computer.
,vol. 36, pp. 41- 50 ,(2003) ,
10.1109/MC.2003.1160055
6.
Martín Abadi,
Secrecy by typing in security protocols
Journal of the ACM.
,vol. 46, pp. 749- 786 ,(1999) ,
10.1145/324133.324266
7.
Elisa Bertino, Sushil Jajodia, Pierangela Samarati,
A flexible authorization mechanism for relational data management systems
ACM Transactions on Information Systems.
,vol. 17, pp. 101- 140 ,(1999) ,
10.1145/306686.306687
8.
Shariq Rizvi, Alberto Mendelzon, S. Sudarshan, Prasan Roy,
Extending query rewriting techniques for fine-grained access control
international conference on management of data.
pp. 551- 562 ,(2004) ,
10.1145/1007568.1007631
9.
David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli,
Role-Based Access Control
,(2003)
10.
David A. Patterson, Archana Ganapathi, David Oppenheimer,
Why Do Internet Services Fail, and What Can Be Done About It?
usenix symposium on internet technologies and systems.
pp. 1- 1 ,(2002)
来源期刊
Telehealth/AT '08 Proceedings of the IASTED International Conference on Telehealth/Assistive Technologies
ACTA Press
2008 年,
Volume: , Issue: ,
Page: 216-222
相似文章
1
E-Health Project Implementation: Privacy and Security Measures and Policies
,2010
,
引用:
0
我的图书馆
我的账户
注册
登录
Copyright 2023 ©KipHub.
高级搜索
查找文章
包含所有这些词
包含完全匹配的短语
包含至少一个这些词
不包含这些词
词语出现的位置
任意位置
标题中
显示以下作者所著的文章:
例如:
丁肇中
或
"PJ Hayes"
显示以下刊物上的文章:
例如:
《学术探索》
或
《Nature》
显示在此期间发表的文章:
—
例如:
1996
百变星君
加载中...