-
1
-
-
35048866988
-
Knowledge-intensive case-based reasoning in creek
-
Springer
-
Aamodt A. Knowledge-intensive case-based reasoning in creek. Advances in case-based reasoning, 7th European conference, ECCBR 2004, proceedings, volume 3155 of lecture notes in artificial intelligence (2004), Springer 1-15
-
(2004)
Advances in case-based reasoning, 7th European conference, ECCBR 2004, proceedings, volume 3155 of lecture notes in artificial intelligence
, pp. 1-15
-
-
Aamodt, A.1
-
2
-
-
0035941713
-
Undermining data privacy in health information
-
Anderson R. Undermining data privacy in health information. British Medical Journal 322 (2001) 442-443
-
(2001)
British Medical Journal
, vol.322
, pp. 442-443
-
-
Anderson, R.1
-
4
-
-
35248876274
-
Patient confidentiality - at risk from NHS wide networking
-
Anderson RJ. Patient confidentiality - at risk from NHS wide networking. In: Proceedings of healthcare 96; 1996b.
-
(1996)
Proceedings of healthcare
, vol.96
-
-
Anderson, R.J.1
-
5
-
-
1842474926
-
Authorisation and access control for electronic health record systems
-
Blobel B. Authorisation and access control for electronic health record systems. International Journal of Medical Informatics 73 3 (2004) 251-257
-
(2004)
International Journal of Medical Informatics
, vol.73
, Issue.3
, pp. 251-257
-
-
Blobel, B.1
-
7
-
-
34748903819
-
-
Technical report, CEN/TC 251, Health Informatics, Brussels, Belgium
-
Brown N., and Reynolds M. Strategy for production and maintenance of standards for interoperability within and between service departments and other healthcare domains. Technical report, CEN/TC 251 (2000), Health Informatics, Brussels, Belgium
-
(2000)
Strategy for production and maintenance of standards for interoperability within and between service departments and other healthcare domains
-
-
Brown, N.1
Reynolds, M.2
-
9
-
-
33747513933
-
Business process driven framework for defining an access control service based on roles and rules
-
Chandramouli R. Business process driven framework for defining an access control service based on roles and rules. In: 23rd National information systems security conference; 2000.
-
(2000)
23rd National information systems security conference
-
-
Chandramouli, R.1
-
12
-
-
77949570363
-
Conceptual graph projection: a tree decomposition-based approach
-
Doherty P., Mylopuolos, and Welty C. (Eds), AAAI
-
Croitoru M., and Compatangelo E. Conceptual graph projection: a tree decomposition-based approach. In: Doherty P., Mylopuolos, and Welty C. (Eds). Proc. of the 10th Int'l Conf. on the principles of knowledge representation and reasoning (KR'2006) (2006), AAAI 271-276
-
(2006)
Proc. of the 10th Int'l Conf. on the principles of knowledge representation and reasoning (KR'2006)
, pp. 271-276
-
-
Croitoru, M.1
Compatangelo, E.2
-
14
-
-
0027560291
-
What is a knowledge representation?
-
Davis R., Shrobe H., and Szolovits P. What is a knowledge representation?. AI Magazine 14 1 (1993) 17-33
-
(1993)
AI Magazine
, vol.14
, Issue.1
, pp. 17-33
-
-
Davis, R.1
Shrobe, H.2
Szolovits, P.3
-
15
-
-
0033562565
-
Privacy in clinical information systems in secondary care
-
Denley I., and Smith S.W. Privacy in clinical information systems in secondary care. British Medical Journal 318 (1999) 1328-1331
-
(1999)
British Medical Journal
, vol.318
, pp. 1328-1331
-
-
Denley, I.1
Smith, S.W.2
-
16
-
-
19144372141
-
Confidentiality of personal information: a patient survey
-
Hawker A. Confidentiality of personal information: a patient survey. Journal of Informatics in Primary Care (1995) 16-19
-
(1995)
Journal of Informatics in Primary Care
, pp. 16-19
-
-
Hawker, A.1
-
17
-
-
77949566755
-
-
HealthAgents. http//www.healthagents.net
-
-
-
HealthAgents1
-
18
-
-
77949566783
-
-
Health level 7
-
http//www.hl7.org Health level 7
-
-
-
-
20
-
-
77949569101
-
-
Openehr
-
http//www.openehr.org Openehr
-
-
-
-
21
-
-
0032191802
-
Towards personal health record: current situation, obstacles and trends in implementation of electronic healthcare records in Europe
-
Iakovidis I. Towards personal health record: current situation, obstacles and trends in implementation of electronic healthcare records in Europe. International Journal of Medical Informatics 52 128 (1998) 105-117
-
(1998)
International Journal of Medical Informatics
, vol.52
, Issue.128
, pp. 105-117
-
-
Iakovidis, I.1
-
22
-
-
77949571136
-
GMSC and RCGP guidelines for the extraction and use of data from general practitioner computer systems by organisations external to the practice. Appenaix III
-
Joint Computer Group of the GMSC and RCGP
-
Joint Computer Group of the GMSC and RCGP, GMSC and RCGP guidelines for the extraction and use of data from general practitioner computer systems by organisations external to the practice. Appenaix III. In: Committee on standards of data extraction from general Practice Guidelines; 1988.
-
(1988)
Committee on standards of data extraction from general Practice Guidelines
-
-
-
25
-
-
44049113210
-
A calculus of mobile processes, i
-
Milner R., Parrow J., and Walker D. A calculus of mobile processes, i. Information and Computation 100 1 (1992) 1-40
-
(1992)
Information and Computation
, vol.100
, Issue.1
, pp. 1-40
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
28
-
-
33646755248
-
Role-based access control for grid database services using the community authorization service
-
Pereira A.L., Muppavarapu V., and Chung S.M. Role-based access control for grid database services using the community authorization service. Transactions on Dependable and Secure Computing 3 2 (2006) 156-166
-
(2006)
Transactions on Dependable and Secure Computing
, vol.3
, Issue.2
, pp. 156-166
-
-
Pereira, A.L.1
Muppavarapu, V.2
Chung, S.M.3
-
31
-
-
26844563373
-
A lightweight coordination calculus for agent systems
-
Springer pp. 183-197
-
Robertson D. A lightweight coordination calculus for agent systems. LNCS vol. 3476 (2005), Springer pp. 183-197
-
(2005)
LNCS
, vol.3476
-
-
Robertson, D.1
-
32
-
-
57349130118
-
-
OpenKnowledge Manifesto
-
Robertson D., Giunchiglia F., Harmelen F., Marchese M., Sabou M., Schorlemmer M., et al. Open knowledge: semantic webs through peer-to-peer interaction (2006), OpenKnowledge Manifesto. http//www.openk.org
-
(2006)
Open knowledge: semantic webs through peer-to-peer interaction
-
-
Robertson, D.1
Giunchiglia, F.2
Harmelen, F.3
Marchese, M.4
Sabou, M.5
Schorlemmer, M.6
-
33
-
-
0030086382
-
Role-based access control models
-
Sandhu R.S., Coyne E.J., Feinstein H.L., and Youman C.E. Role-based access control models. Computer 29 2 (1996) 38-47
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
36
-
-
0001853125
-
The computer of the 21st century
-
Weiser M. The computer of the 21st century. Scientific American 265 3 (2001) 66-75
-
(2001)
Scientific American
, vol.265
, Issue.3
, pp. 66-75
-
-
Weiser, M.1
-
37
-
-
56649096066
-
Adaptive agent model: software adaptivity using an agent-oriented model driven architecture
-
Elsevier
-
Xiao L., and Greer D. Adaptive agent model: software adaptivity using an agent-oriented model driven architecture. Information and Software Technology 51 1 (2009) 109-137 Elsevier
-
(2009)
Information and Software Technology
, vol.51
, Issue.1
, pp. 109-137
-
-
Xiao, L.1
Greer, D.2
-
38
-
-
56449095977
-
Developing a security protocol for a distributed decision support system in a healthcare environment
-
ACM
-
Xiao L., Lewis P., and Gibb A. Developing a security protocol for a distributed decision support system in a healthcare environment. 30th international conference on software engineering (2008), ACM 673-682
-
(2008)
30th international conference on software engineering
, pp. 673-682
-
-
Xiao, L.1
Lewis, P.2
Gibb, A.3
-
39
-
-
37349048859
-
An adaptive security model for multi-agent systems and application to a clinical trials environment
-
IEEE Press
-
Xiao L., Peet A., Lewis P., Dashmapatra S., Sáez C., Croitoru M., et al. An adaptive security model for multi-agent systems and application to a clinical trials environment. 31st IEEE annual international computer software and applications conference (2007), IEEE Press 261-266
-
(2007)
31st IEEE annual international computer software and applications conference
, pp. 261-266
-
-
Xiao, L.1
Peet, A.2
Lewis, P.3
Dashmapatra, S.4
Sáez, C.5
Croitoru, M.6
|