From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Meeting EHR Security Requirements: SeAAS Approach., , , , и . EFMI-STC, том 155 из Studies in Health Technology and Informatics, стр. 85-91. IOS Press, (2010)Modeling techniques for enterprise architecture documentation: experiences from practice., , и . MULTI@MoDELS, том 1286 из CEUR Workshop Proceedings, стр. 113-122. CEUR-WS.org, (2014)Meeting EHR Security Requirements: Authentication as a Security Service., , , , и . perspeGKtive, том P-174 из LNI, стр. 103-110. GI, (2010)An Authoring Framework for Security Policies: A Use-Case within the Healthcare Domain., , , и . eHealth, том 69 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 1-9. Springer, (2010)Combining Textual and Web-Based Modeling., , и . MoDELS (Demos), том 1255 из CEUR Workshop Proceedings, CEUR-WS.org, (2014)An Enterprise Architecture Planning Process for Industry 4.0 Transformations., , , , , и . ICEIS (2), стр. 572-579. SciTePress, (2019)Service-Oriented Architecture for Privacy-Preserving Data Mashup., , и . ICWS, стр. 767-774. IEEE Computer Society, (2009)The Process of Policy Authoring of Patient-Controlled Privacy Preferences., , , , и . eHealth, том 91 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 97-104. Springer, (2011)Enterprise Architecture Planning: Analyses of Requirements from Practice and Research., , , , , и . HICSS, стр. 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)Enterprise Architecture Planning in the Context of Industry 4.0 Transformations., , , , , и . EDOC, стр. 35-43. IEEE Computer Society, (2018)