-
2
-
-
84970850862
-
NHS-wide networking and patient confidentiality
-
R. J. Anderson. NHS-wide networking and patient confidentiality. BMJ, 311(6996):5-6, 1995.
-
(1995)
BMJ
, vol.311
, Issue.6996
, pp. 5-6
-
-
Anderson, R.J.1
-
3
-
-
0030028303
-
Clinical system security: Interim guidelines
-
R. J. Anderson. Clinical system security: interim guidelines. BMJ, 312(7023):109-111, 1996.
-
(1996)
BMJ
, vol.312
, Issue.7023
, pp. 109-111
-
-
Anderson, R.J.1
-
5
-
-
35548933972
-
-
T. Beale, S. Heard, D. Kalra, and D. Lloyd. openEHR Architecture Overview. http://www.openEHR.org, Mar 2006.
-
T. Beale, S. Heard, D. Kalra, and D. Lloyd. openEHR Architecture Overview. http://www.openEHR.org, Mar 2006.
-
-
-
-
6
-
-
0022114934
-
Consistency in a partitioned network: A survey
-
S. B. Davidson, H. Garcia-Molina, and D. Skeen. Consistency in a partitioned network: a survey. ACM Comput. Surv., 17(3):341-370, 1985.
-
(1985)
ACM Comput. Surv
, vol.17
, Issue.3
, pp. 341-370
-
-
Davidson, S.B.1
Garcia-Molina, H.2
Skeen, D.3
-
7
-
-
33846576210
-
Audit-based access control for electronic health records
-
M. A. C. Dekker and S. Etalle. Audit-based access control for electronic health records. Electron. Notes Theor. Comput. Sci., 168:221-236, 2007.
-
(2007)
Electron. Notes Theor. Comput. Sci
, vol.168
, pp. 221-236
-
-
Dekker, M.A.C.1
Etalle, S.2
-
8
-
-
0000338326
-
Programming semantics for multiprogrammed computations
-
Mar
-
J. Dennis and E. V. Horn. Programming semantics for multiprogrammed computations. Communications of the ACM, 9(3):143-155, Mar. 1966.
-
(1966)
Communications of the ACM
, vol.9
, Issue.3
, pp. 143-155
-
-
Dennis, J.1
Horn, E.V.2
-
9
-
-
0012296562
-
-
Department of Defense, Department of defense (DoD) trusted computer system evaluation criteria TCSEC
-
Department of Defense. DoD 5200.28-STD: Department of defense (DoD) trusted computer system evaluation criteria (TCSEC), 1985.
-
(1985)
DoD 5200.28-STD
-
-
-
10
-
-
33745176972
-
A survey and analysis of electronic healthcare record standards
-
M. Eichelberg, T. Aden, J. Riesmeier, A. Dogac, and G. B. Laleci. A survey and analysis of electronic healthcare record standards. ACM Comput. Surv., 37(4):277-315, 2005.
-
(2005)
ACM Comput. Surv
, vol.37
, Issue.4
, pp. 277-315
-
-
Eichelberg, M.1
Aden, T.2
Riesmeier, J.3
Dogac, A.4
Laleci, G.B.5
-
11
-
-
33745183324
-
HIT and MIS: Implications of health information technology and medical information systems
-
P. G. Goldschmidt. HIT and MIS: implications of health information technology and medical information systems. Commun. ACM, 48(10):68-74, 2005.
-
(2005)
Commun. ACM
, vol.48
, Issue.10
, pp. 68-74
-
-
Goldschmidt, P.G.1
-
13
-
-
35548999899
-
-
B. Lampson. Protection. In Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems, pages 437-443, Princeton University, Mar. 1971. Reprinted in ACM Operating Systems Review, 8, 1, January 1974, pp. 18-24.
-
B. Lampson. Protection. In Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems, pages 437-443, Princeton University, Mar. 1971. Reprinted in ACM Operating Systems Review, 8, 1, January 1974, pp. 18-24.
-
-
-
-
14
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
Washington, DC, USA, IEEE Computer Society
-
J. M. McCune, A. Perrig, and M. K. Reiter. Seeing-is-believing: Using camera phones for human-verifiable authentication. In SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 110-124, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 110-124
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
16
-
-
84953635000
-
Description of a new variable-length key, 64-bit block cipher (blowfish)
-
London, UK, Springer-Verlag
-
B. Schneier. Description of a new variable-length key, 64-bit block cipher (blowfish). In Fast Software Encryption, Cambridge Security Workshop, pages 191-204, London, UK, 1994. Springer-Verlag.
-
(1994)
Fast Software Encryption, Cambridge Security Workshop
, pp. 191-204
-
-
Schneier, B.1
-
17
-
-
0022561959
-
Using sparse capabilities in a distributed operating system
-
Washington, DC, IEEE Computer Society
-
A. Tanenbaum, S. Mullender, and R. van Renesse. Using sparse capabilities in a distributed operating system. In Proceedings of the 6th International Conference on Distributed Computing Systems (ICDCS), pages 558-563, Washington, DC, 1986. IEEE Computer Society.
-
(1986)
Proceedings of the 6th International Conference on Distributed Computing Systems (ICDCS)
, pp. 558-563
-
-
Tanenbaum, A.1
Mullender, S.2
van Renesse, R.3
|