From post

A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems.

, , , и . ACISP, том 2727 из Lecture Notes in Computer Science, стр. 403-415. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A taint marking approach to confidentiality violation detection., , , и . AISC, том 125 из CRPIT, стр. 83-90. Australian Computer Society, (2012)Information Sharing in the 21st century: Progress and Challenges., , , и . AISC, том 105 из CRPIT, стр. 2. Australian Computer Society, (2010)SPCC: a security policy compliance checker plug-in for YAWL., , и . Int. J. Bus. Process. Integr. Manag., 9 (1): 22-31 (2018)DRM, Trusted Computing and Operating System Architecture., и . ACSW, том 44 из CRPIT, стр. 127-136. Australian Computer Society, (2005)JPL BioSleeve for gesture-based control: Technology development and field trials., , , , и . TePRA, стр. 1-6. IEEE, (2015)Optimal Budget Allocation in Budget-based Access Control., , , и . ARES, стр. 591-596. IEEE Computer Society, (2011)A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems., , , и . ACISP, том 2727 из Lecture Notes in Computer Science, стр. 403-415. Springer, (2003)If it's encrypted its secure! The viability of US state-based encryption exemptions., , и . ISTAS, стр. 96-102. IEEE, (2010)Floating-base manipulation on zero-perturbation manifolds., , и . CoRR, (2023)A policy model for access control using building information models., , , и . Int. J. Crit. Infrastructure Prot., (2018)