-
3
-
-
84944371864
-
Computer surveillance of hospital-acquired infections and antibiotic use
-
R. Scott Evans et al. : "Computer Surveillance of Hospital-acquired Infections and Antibiotic Use"; J. of theAMA, Vol. 256 No. 8, 1986, pp. 1007-1011.
-
(1986)
J. of TheAMA
, vol.256
, Issue.8
, pp. 1007-1011
-
-
Scott Evans, R.1
-
5
-
-
0029490197
-
Confidential communication on the internet
-
Thomas Beth: December
-
Thomas Beth: "Confidential Communication on the Internet"; Scientific American, December 1995, pp. 88-91.
-
(1995)
Scientific American
, pp. 88-91
-
-
-
9
-
-
85077745984
-
TCP wrapper: Network monitoring, access control, and booby traps
-
Baltimore MD
-
Wietse Venema: "TCP wrapper: Network Monitoring, Access Control, and Booby Traps"; Proc. 3rd Usenix Security Symp., Baltimore MD, 1992.
-
(1992)
Proc. 3rd Usenix Security Symp.
-
-
Venema, W.1
-
13
-
-
0344024833
-
Guaranteeing anonymity when sharing medical data, the DATAFLY system
-
Latanya Sweeney, Washington DC, Hanley & Belfus
-
Latanya Sweeney: "Guaranteeing anonymity when sharing medical data, the DATAFLY system"; Proceedings, Journal of the American Medical Informatics Association, Washington DC, Hanley & Belfus, 1997.
-
(1997)
Proceedings, Journal of the American Medical Informatics Association
-
-
-
14
-
-
84976657250
-
An authorization mechanism for a relational database system
-
Sept.
-
Patricia P. Griffiths and Bradford W. Wade: "An Authorization Mechanism for a Relational Database System"; ACM Trans, on Database Systems, Vol. 1 No. 3, Sept. 1976, pp. 242-255.
-
(1976)
ACM Trans, on Database Systems
, vol.1
, Issue.3
, pp. 242-255
-
-
Griffiths, P.P.1
Wade, B.W.2
-
16
-
-
84887073412
-
Tuckerman: The ips cryptographic programs
-
A. G. Konheim, M. H. Mack, R. K. McNeil, B. Tuckerman: The IPS Cryptographic Programs"; IBMSys. J., Vol. 19 No2, 1980, pp. 302-307.
-
(1980)
IBMSys. J.
, vol.19
, Issue.2
, pp. 302-307
-
-
Konheim, A.G.1
Mack, M.H.2
McNeil B, R.K.3
-
17
-
-
0024012004
-
The first ten years of public-key cryptography
-
May Whitfield Diifie
-
Whitfield Diifie: "The First Ten Years of Public-Key Cryptography"; Proc. IEEE, Vol. 76 No. 5, May 1988, pp. 560-577.
-
(1988)
Proc. IEEE
, vol.76
, Issue.5
, pp. 560-577
-
-
-
18
-
-
0025442003
-
The seaview security model
-
Therea Lunt et al. : "The SeaView Security Model"; IEEE Trans, on Software Eng., Vol. 16 No. 6, 1990, pp. 593-607.
-
(1990)
IEEE Trans, on Software Eng.
, vol.16
, Issue.6
, pp. 593-607
-
-
Lunt, T.1
-
19
-
-
84976678844
-
Information organization using Rums
-
June
-
A. Luniewski et al. "Information organization using Rums" SIGMOD '93, ACM S1GMOD Record, June] 1993, vol. 22, no. 2 p. 560-561
-
(1993)
SIGMOD '93, ACM S1GMOD Record
, vol.22
, Issue.2
, pp. 560-561
-
-
Luniewski, A.1
-
20
-
-
0002779304
-
Rindfleisch: Privacy, information technology, and health care
-
Aug.
-
Thomas C. Rindfleisch: Privacy, Information Technology, and Health Care; Comm. ACM; Vol. 40 No. 8, Aug. 1997, pp. 92-100.
-
(1997)
Comm. ACM
, vol.40
, Issue.8
, pp. 92-100
-
-
Thomas, C.1
-
21
-
-
0030087440
-
Sharing manufacturing information in virtual enterprises
-
February
-
M. Hardwick, D. L. Spooner, T. Rando, and KC Morris: "Sharing Manufacturing Information In Virtual Enterprises"; Comm. ACM, Vol. 39 no. 2, pp. 46-54, February 1996.
-
(1996)
Comm. ACM
, vol.39
, Issue.2
, pp. 46-54
-
-
Hardwick, M.1
Spooner, D.L.2
Rando, T.3
Morris, K.C.4
-
22
-
-
0030347009
-
A security mediator for health care information
-
Oct.
-
Gio Wiederhold, Michel Bilello, Vatsala Sarathy, and XiaoLei Qian: A Security Mediator for Health Care Information"; Journal of the AMIA, issue containing the Proceedings of the 1996 AMIA Conference, Oct. 1996,pp. l20-124.
-
(1996)
Journal of the AMIA, Issue Containing the Proceedings of the 1996 AMIA Conference
-
-
Wiederhold, G.1
Bilello, M.2
Sarathy, V.3
Qian, X.4
-
23
-
-
0002851150
-
-
in T. Y. Lin and Shelly Q\an:Database Security XI, Status and Prospects, IFIP / Chapman & Hall
-
Gio Wiederhold, Michel Bilello, and Chris Donahue: "Web Implementation of a Security Mediator for Medical Databases"; in T. Y. Lin and Shelly Q\an:Database Security XI, Status and Prospects, IFIP / Chapman & Hall, 1998, pp. 60-72.
-
(1998)
Web Implementation of A Security Mediator for Medical Databases
, pp. 60-72
-
-
Wiederhold, G.1
Bilello, M.2
Donahue, C.3
-
25
-
-
0031359436
-
Rule-based database access control-a practical approach
-
Tor Didriksen:
-
Tor Didriksen: "Rule-based Database Access Control-A Practical Approach"; Proc. 2nd ACMworkshop on Rule-based Access Control, 1997, pp. 143-151.
-
(1997)
Proc. 2nd ACMworkshop on Rule-based Access Control
, pp. 143-151
-
-
-
26
-
-
0024627547
-
Secure query processing strategies
-
March
-
T. Keefe, B. Thuraisingham, and W. Tsai: "Secure Query Processing Strategies"; IEEE Computer, Vol. 22 No. 3, March 1989, pp. 63-70.
-
(1989)
IEEE Computer
, vol.22
, Issue.3
, pp. 63-70
-
-
Keefe, T.1
Thuraisingham, B.2
Tsai, W.3
-
27
-
-
0030333205
-
Replacing personally-identifying information in medical records, the scrub system
-
Latanya Sweeney, Washington, DC: Hanley & Belfus
-
Latanya Sweeney: "Replacing personally-identifying information in medical records, the SCRUB system"; J. J. Cimino, ed. Proceedings, Journal of the American Medical Informatics Association, Washington, DC: Hanley & Belfus, 1996, Pp. 333-337.
-
(1996)
Proceedings, Journal of the American Medical Informatics Association
, pp. 333-337
-
-
Cimino, J.J.1
-
28
-
-
0020303338
-
Randomizing, a practical method for protecting statistical databases against compromise
-
McLeod and Villasenor(eds)
-
E. Leiss: "Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise"; Proceedings of the Conference on Very Large Databases (VLDB), Morgan Kaufman pubs. (Los Altos CA) 8, 1982, McLeod and Villasenor(eds), pp 189-196
-
(1982)
Proceedings of the Conference on Very Large Databases (VLDB), Morgan Kaufman Pubs. (Los Altos CA)
, vol.8
, pp. 189-196
-
-
Leiss, E.1
-
29
-
-
0001031920
-
Wavelet-based progressive transmission and security filtering for medical image distribution
-
in Stephen Wong (ed. ) Kluwer publishers
-
James Z. Wang, Gio Wiederhold, and Jia Li: Wavelet-based Progressive Transmission and Security Filtering for Medical Image Distribution"; in Stephen Wong (ed. ): Medical Image Databases', Kluwer publishers, 1998, pp. 303-324.
-
(1998)
Medical Image Databases
, pp. 303-324
-
-
Wang, J.Z.1
Wiederhold, G.2
Li, J.3
-
30
-
-
0024914229
-
Wortmann: Security-control methods for statistical databases: A comparative study
-
Dec.
-
N. R. Adam andJ. C. Wortmann: Security-Control Methods for Statistical Databases: a Comparative Study; ACM Computing Surveys, Vol. 25 No. 4, Dec. 1989.
-
(1989)
ACM Computing Surveys
, vol.25
, Issue.4
-
-
Adam, N.R.C.J.1
-
31
-
-
0023861339
-
Inference aggregation detection in database management systems
-
Oakland CA, April
-
T. Hinke: "Inference Aggregation Detection in Database Management Systems"; Proc. IEEE Symposium on Security and Privacy, Oakland CA, April 1988.
-
(1988)
Proc. IEEE Symposium on Security and Privacy
-
-
Hinke, T.1
-
32
-
-
0029686313
-
National health information privacy bill generates heat at scamc
-
Bill Braithwaite: "National health information privacy bill generates heat at SCAMC"; Journal of the American Informatics Association, Vol. 3 no. l, 1996, pp. 95-96
-
(1996)
Journal of the American Informatics Association
, vol.3
, Issue.1
, pp. 95-96
-
-
Braithwaite, B.1
-
33
-
-
0030748330
-
Maintaining the confidentiality of medical records shared over the internet and the world wide web
-
15 July
-
David M. Rind, Isaac S. Kohane, Peter Szolovits, Charles Safran, Henry C. Chueh, and G. Octo Baraett: "Maintaining the Confidentiality of Medical Records Shared over the Internet and the World Wide Web"; Annals of Internal Medicine, 15 July 1997. pp. 127-141.
-
(1997)
Annals of Internal Medicine
, pp. 127-141
-
-
Rind, D.M.1
Kohane, I.S.2
Szolovits, P.3
Safran, C.4
Chueh, H.C.5
Octo Baraett, G.6
-
34
-
-
84887095869
-
Protecting information when access is granted for collaboration
-
in B. Thuraisingham, Z. Tarri, K. Ditttrich (eds)
-
Gio Wiederhold: "Protecting Information when Access is Granted for Collaboration"; in B. Thuraisingham, Z. Tarri, K. Ditttrich (eds): Proc. IFIP WG11. 3 in Database Security; IFIP-Kluwer, pp. 3-11.
-
Proc. IFIP WG11. 3 in Database Security; IFIP-Kluwer
, pp. 3-11
-
-
Wiederhold, G.1
|