Author of the publication

A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems.

, , , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 403-415. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A policy model for access control using building information models., , , and . Int. J. Crit. Infrastructure Prot., (2018)Floating-base manipulation on zero-perturbation manifolds., , and . CoRR, (2023)If it's encrypted its secure! The viability of US state-based encryption exemptions., , and . ISTAS, page 96-102. IEEE, (2010)A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems., , , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 403-415. Springer, (2003)On the enhancement of TCP/IP protocol for use in High Frequency Communication Systems., , , and . MilCIS, page 1-7. IEEE, (2020)An Approach to Access Control under Uncertainty., , , and . ARES, page 1-8. IEEE Computer Society, (2011)A taint marking approach to confidentiality violation detection., , , and . AISC, volume 125 of CRPIT, page 83-90. Australian Computer Society, (2012)Information Sharing in the 21st century: Progress and Challenges., , , and . AISC, volume 105 of CRPIT, page 2. Australian Computer Society, (2010)SPCC: a security policy compliance checker plug-in for YAWL., , and . Int. J. Bus. Process. Integr. Manag., 9 (1): 22-31 (2018)DRM, Trusted Computing and Operating System Architecture., and . ACSW, volume 44 of CRPIT, page 127-136. Australian Computer Society, (2005)