-
1
-
-
80053545332
-
Excellus BlueCross, and New York State Department of Health
-
Health Form, August
-
Bomba P,. Excellus BlueCross, and New York State Department of Health. Molst-Medical orders for life-sustaining treatment. Health Form, August 2008.
-
(2008)
Molst-Medical Orders for Life-sustaining Treatment
-
-
Bomba, P.1
-
2
-
-
77749269193
-
-
Technical Report, Software Research and Development Center, Middle East Technical University, Ankara, Turkey, December
-
Dogac A, Namli T,. Implementation experiences on ihe xua and bppc. Technical Report, Software Research and Development Center, Middle East Technical University, Ankara, Turkey, December 2006.
-
(2006)
Implementation Experiences on Ihe Xua and Bppc
-
-
Dogac, A.1
Namli, T.2
-
3
-
-
63849319193
-
A workflow solution for electronic health records to improve healthcare delivery efficiency in rural India
-
Koppar AR, Sridhar V,. A workflow solution for electronic health records to improve healthcare delivery efficiency in rural India. eTELEMED, Cancun, Mexico, 2009; 227-232.
-
(2009)
ETELEMED, Cancun, Mexico
, pp. 227-232
-
-
Koppar, A.R.1
Sridhar, V.2
-
4
-
-
84869595635
-
Privacy and access control for ihe-based systems
-
Katt B, Breu R, Hafner M, Schabetsberger T, Mair R, Wozak F,. Privacy and access control for ihe-based systems. eHealth, London, U.K., 2008; 145-153.
-
(2008)
EHealth, London, U.K
, pp. 145-153
-
-
Katt, B.1
Breu, R.2
Hafner, M.3
Schabetsberger, T.4
Mair, R.5
Wozak, F.6
-
5
-
-
80052315881
-
Temporal dependency based checkpoint selection for dagoynamic verification of temporal constraints in scientific workflow systems
-
Available at: [17 June ]
-
Chen J, Yang Y,. Temporal dependency based checkpoint selection for dagoynamic verification of temporal constraints in scientific workflow systems. ACM Transactions on Software Engineering and Methodology 2009. Available at: http://www.swinflow.org/papers/TOSEM.pdf [17 June 2009 ].
-
(2009)
ACM Transactions on Software Engineering and Methodology 2009
-
-
Chen, J.1
Yang, Y.2
-
6
-
-
70349916404
-
Trust-based robust scheduling and runtime adaptation of scientific workflow
-
Wiley: New York, ISSN: 1532-0626.
-
Wang M, Kotagiri R, Chen J,. Trust-based robust scheduling and runtime adaptation of scientific workflow. Concurrency and Computation: Practice and Experience. Wiley: New York, 2009; 1982-1998. ISSN: 1532-0626.
-
(2009)
Concurrency and Computation: Practice and Experience
, pp. 1982-1998
-
-
Wang, M.1
Kotagiri, R.2
Chen, J.3
-
8
-
-
36748999441
-
Implementation and performance evaluation of the parallel CORBA application on computational grids
-
DOI 10.1016/j.advengsoft.2007.02.001, PII S0965997807000439
-
Wang L,. Implementation and performance evaluation of the parallel corba application on computational grids. Advances in Engineering Software 2008; 39 (3): 211-218. (Pubitemid 350213399)
-
(2008)
Advances in Engineering Software
, vol.39
, Issue.3
, pp. 211-218
-
-
Wang, L.1
-
9
-
-
80053480260
-
Excellus BlueCross, and New York State Department of Health
-
Health Form, August
-
Bomba P,. Excellus BlueCross, and New York State Department of Health. Molst-Supplemental documentation form for adults. Health Form, August 2008.
-
(2008)
Molst-Supplemental Documentation Form for Adults
-
-
Bomba, P.1
-
11
-
-
41949086982
-
The venn of identity: Options and issues in federated identity management
-
DOI 10.1109/MSP.2008.50, 4480459
-
Maler E, Reed D,. The venn of identity: Options and issues in federated identity management. IEEE Security & Privacy 2008; 6 (2): 16-23. (Pubitemid 351506252)
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.2
, pp. 16-23
-
-
Maler, E.1
Reed, D.2
-
12
-
-
49049105933
-
Hardening xds-based architectures
-
Wuyts K, Scandariato R, Claeys G, Joosen W,. Hardening xds-based architectures. ARES, Barcelona, Spain, 2008; 18-25.
-
(2008)
ARES, Barcelona, Spain
, pp. 18-25
-
-
Wuyts, K.1
Scandariato, R.2
Claeys, G.3
Joosen, W.4
-
13
-
-
33749626245
-
-
ICDE, Atlanta, GA, U.S.A
-
Dogac A, Bicer V, Okcan A,. Collaborative business process support in ihe xds through ebxml business processes. ICDE, Atlanta, GA, U.S.A., 2006; 91.
-
(2006)
Collaborative Business Process Support in Ihe Xds Through Ebxml Business Processes
, pp. 91
-
-
Dogac, A.1
Bicer, V.2
Okcan, A.3
-
14
-
-
80053523366
-
-
IHE International Technical Report, IHE International, December
-
IHE International. Ihe it infrastructure (iti) technical framework. Technical Report, IHE International, December 2008.
-
(2008)
Ihe It Infrastructure (Iti) Technical Framework
-
-
-
15
-
-
34547448344
-
-
Digital Identity Management, Alexandria, VA, U.S.A
-
Recordon D, Reed D,. Openid 2.0: A platform for user-centric identity management. Digital Identity Management, Alexandria, VA, U.S.A., 2006; 11-16.
-
(2006)
Openid 2.0: A Platform for User-centric Identity Management
, pp. 11-16
-
-
Recordon, D.1
Reed, D.2
-
16
-
-
44149084292
-
The security limitations of SSO in OpenID
-
DOI 10.1109/ICACT.2008.4494089, 4494089, 10th International Conference on Advanced Communication Technology, ICACT 2008 - Proceedings
-
Oh H-K, Jin S-H,. The security limitations of sso in openid. 10th International Conference on Advanced Communication Technology, ICACT'08, Gangwon-Do, South Korea, vol. 3, 2008; 1608-1611. (Pubitemid 351714829)
-
(2008)
International Conference on Advanced Communication Technology, ICACT
, vol.3
, pp. 1608-1611
-
-
Oh, H.-K.1
Jin, S.-H.2
-
17
-
-
0033661308
-
Role delegation in role-based access control
-
ACM: New York, NY, U.S.A.
-
Na S, Cheon S,. Role delegation in role-based access control. RBAC '00: Proceedings of the Fifth ACM Workshop on Role-based Access Control. ACM: New York, NY, U.S.A., 2000; 39-44.
-
(2000)
RBAC '00: Proceedings of the Fifth ACM Workshop on Role-based Access Control
, pp. 39-44
-
-
Na, S.1
Cheon, S.2
-
18
-
-
70450265318
-
A formal framework to elicit roles with business meaning in rbac systems
-
ACM: New York, NY, U.S.A.
-
Colantonio A, Di Pietro R, Ocello A, Vincenzo Verde N,. A formal framework to elicit roles with business meaning in rbac systems. SACMAT '09: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. ACM: New York, NY, U.S.A., 2009; 85-94.
-
(2009)
SACMAT '09: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies
, pp. 85-94
-
-
Colantonio, A.1
Di Pietro, R.2
Ocello, A.3
Vincenzo Verde, N.4
-
19
-
-
51149119089
-
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption
-
Chevalier Y, Küsters R, Rusinowitch M, Turuani M,. Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption. ACM Transactions on Computational Logic 2008; 9 (4): 1-52.
-
(2008)
ACM Transactions on Computational Logic
, vol.9
, Issue.4
, pp. 1-52
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
20
-
-
46849107744
-
Intelligent agents as trust negotiators for federated security
-
Panayappan A, Anand S, Pushpakath RP,. Intelligent agents as trust negotiators for federated security. ICWS, Salt Lake City, UT, U.S.A., 2007; 1183-1184.
-
(2007)
ICWS, Salt Lake City, UT, U.S.A
, pp. 1183-1184
-
-
Panayappan, A.1
Anand, S.2
Pushpakath, R.P.3
-
21
-
-
63349109294
-
Establishing trust management in an open source collaborative information repository: An emergency response information system case study
-
Eryilmaz E, Cochran M, Kasemvilas S,. Establishing trust management in an open source collaborative information repository: An emergency response information system case study. HICSS, Waikoloa, Big Island, HI, U.S.A., 2009; 1-10.
-
(2009)
HICSS, Waikoloa, Big Island, HI, U.S.A
, pp. 1-10
-
-
Eryilmaz, E.1
Cochran, M.2
Kasemvilas, S.3
-
22
-
-
70249099523
-
Using web service enhancements to establish trust relationships with privacy protection (extended and invited from icws 2006 with id 47)
-
Weaver AC, Wu Z,. Using web service enhancements to establish trust relationships with privacy protection (extended and invited from icws 2006 with id 47). International Journal of Web Services Research 2009; 6 (1): 49-68.
-
(2009)
International Journal of Web Services Research
, vol.6
, Issue.1
, pp. 49-68
-
-
Weaver, A.C.1
Wu, Z.2
|