-
1
-
-
77954310707
-
They do what they think is the best for me. Frail elderly patients' preferences for participation in their care during hospitalization
-
Ekdahl A.W., Andersson L., Friedrichsen M. They do what they think is the best for me. Frail elderly patients' preferences for participation in their care during hospitalization. Patient Educ. Couns. 2010, 80(2):233-240.
-
(2010)
Patient Educ. Couns.
, vol.80
, Issue.2
, pp. 233-240
-
-
Ekdahl, A.W.1
Andersson, L.2
Friedrichsen, M.3
-
2
-
-
33750744781
-
Individualization, globalization and health-about sustainable information technologies and the aim of medical informatics
-
Haux R. Individualization, globalization and health-about sustainable information technologies and the aim of medical informatics. Int. J. Med. Inform. 2006, 75(12):795-808.
-
(2006)
Int. J. Med. Inform.
, vol.75
, Issue.12
, pp. 795-808
-
-
Haux, R.1
-
8
-
-
74149086959
-
USB-based personal health records: an analysis of features and functionality
-
Maloney F.L., Wright A. USB-based personal health records: an analysis of features and functionality. Int. J. Med. Inform. 2010, 79(2):97-111.
-
(2010)
Int. J. Med. Inform.
, vol.79
, Issue.2
, pp. 97-111
-
-
Maloney, F.L.1
Wright, A.2
-
10
-
-
54449097962
-
Whose personal control? Creating private, personally controlled health records for pediatric and adolescent patients
-
Bourgeois F., Taylor P., Emans J., Nigrin D., Mandl K. Whose personal control? Creating private, personally controlled health records for pediatric and adolescent patients. J. Am. Med. Inform. Assoc. 2008, 15(6):737-743.
-
(2008)
J. Am. Med. Inform. Assoc.
, vol.15
, Issue.6
, pp. 737-743
-
-
Bourgeois, F.1
Taylor, P.2
Emans, J.3
Nigrin, D.4
Mandl, K.5
-
11
-
-
84870552448
-
-
Connecting for Health: The Personal Health Working Group Final Report. Technical Report
-
Markle Foundation. Connecting for Health: The Personal Health Working Group Final Report. Technical Report, 2003.
-
(2003)
Markle Foundation
-
-
-
12
-
-
0034904090
-
Adoption of smart cards in the medical sector: the Canadian experience
-
Aubert B.A., Hamel G. Adoption of smart cards in the medical sector: the Canadian experience. Soc. Sci. Med. 2001, 53(7):879-894.
-
(2001)
Soc. Sci. Med.
, vol.53
, Issue.7
, pp. 879-894
-
-
Aubert, B.A.1
Hamel, G.2
-
15
-
-
84870519583
-
-
ITU-T Rec. X.1142 | OASIS XACML v2. 0 Core: eXtensible Access Control Markup Language Version 2.0, Available from:
-
ITU-T Rec. X.1142 | OASIS XACML v2. 0 Core: eXtensible Access Control Markup Language Version 2.0, 2005. Available from: http://www.oasis-open.org/committees/xacml.
-
(2005)
-
-
-
21
-
-
84870503015
-
-
HITSP. HITSP/SC108-Access Control Service Collaboration, Version 1.1
-
HITSP. HITSP/SC108-Access Control Service Collaboration, Version 1.1, 2010.
-
(2010)
-
-
-
22
-
-
84870561885
-
-
ITU-T. Rec. X.901 Information technology-Open Distributed Processing-Reference Model: Overview
-
ITU-T. Rec. X.901 Information technology-Open Distributed Processing-Reference Model: Overview, 1997.
-
(1997)
-
-
-
23
-
-
84870478829
-
-
ISO12967-1, 2, 3: Health Informatics-Service Architecture
-
ISO12967-1, 2, 3: Health Informatics-Service Architecture, 2008.
-
(2008)
-
-
-
24
-
-
84870500027
-
-
ITU-T Rec. X.906 | ISO 19793: Information Technology-Open Distributed Processing-Use of UML for ODP System Specifications
-
ITU-T Rec. X.906 | ISO 19793: Information Technology-Open Distributed Processing-Use of UML for ODP System Specifications, 2008.
-
(2008)
-
-
-
25
-
-
50649119767
-
Advanced security for virtual organizations: the pros and cons of centralized vs decentralized security models
-
Sinnott R.O., Chadwick D.W., Doherty T., Martin D., Stell A., Stewart G., et al. Advanced security for virtual organizations: the pros and cons of centralized vs decentralized security models. Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid 2008, 106-113.
-
(2008)
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid
, pp. 106-113
-
-
Sinnott, R.O.1
Chadwick, D.W.2
Doherty, T.3
Martin, D.4
Stell, A.5
Stewart, G.6
-
26
-
-
63649096038
-
Security architecture for virtual organizations of business web services
-
Kerschbaum F., Robinson P. Security architecture for virtual organizations of business web services. J. Syst. Arch. 2009, 55(4):224-232.
-
(2009)
J. Syst. Arch.
, vol.55
, Issue.4
, pp. 224-232
-
-
Kerschbaum, F.1
Robinson, P.2
-
28
-
-
79952466879
-
Privilege management infrastructure for virtual organizations in healthcare grids
-
Calvillo J., Roman I., Rivas S., Roa L. Privilege management infrastructure for virtual organizations in healthcare grids. IEEE Trans. Inform. Technol. Biomed. 2011, 15(2):316-323.
-
(2011)
IEEE Trans. Inform. Technol. Biomed.
, vol.15
, Issue.2
, pp. 316-323
-
-
Calvillo, J.1
Roman, I.2
Rivas, S.3
Roa, L.4
-
29
-
-
84870487706
-
-
OMG. Model-Driven Architecture. Available from:
-
OMG. Model-Driven Architecture. Available from: http://www.omg.org/mda/.
-
-
-
-
32
-
-
18744404327
-
-
Available from:
-
Horrocks I., Patel-Schneider P., Boley H., Tabet S., Grosof B., Dean M. SWRL: A Semantic Web Rule Language Combining OWL and RuleML 2004, Available from:. http://www.w3.org/Submission/SWRL/.
-
(2004)
SWRL: A Semantic Web Rule Language Combining OWL and RuleML
-
-
Horrocks, I.1
Patel-Schneider, P.2
Boley, H.3
Tabet, S.4
Grosof, B.5
Dean, M.6
-
33
-
-
57349182523
-
ROWLBAC: representing role based access control in OWL
-
Finin T., Joshi A., Kagal L., Niu J., Sandhu R., Winsborough W., et al. ROWLBAC: representing role based access control in OWL. Proceedings of the 13th Symposium on Access Control Models and Technologies 2008, 73-82.
-
(2008)
Proceedings of the 13th Symposium on Access Control Models and Technologies
, pp. 73-82
-
-
Finin, T.1
Joshi, A.2
Kagal, L.3
Niu, J.4
Sandhu, R.5
Winsborough, W.6
-
35
-
-
71049143234
-
POLIPO: Policies & OntoLogies for Interoperability, Portability, and autonomy
-
Trivellato D., Spiessens F., Zannone N., Etalle S. POLIPO: Policies & OntoLogies for Interoperability, Portability, and autonomy. Proceedings of POLICY'09 2009.
-
(2009)
Proceedings of POLICY'09
-
-
Trivellato, D.1
Spiessens, F.2
Zannone, N.3
Etalle, S.4
-
37
-
-
70349093164
-
A semantic-aware attribute-based access control model for web services
-
Shen H. A semantic-aware attribute-based access control model for web services. Lect. Notes Comput. Sci. 2009, 5574:693-703.
-
(2009)
Lect. Notes Comput. Sci.
, vol.5574
, pp. 693-703
-
-
Shen, H.1
-
40
-
-
78650322645
-
Multi-level authorisation model and framework for distributed semantic-aware environments
-
Amini M., Jalili R. Multi-level authorisation model and framework for distributed semantic-aware environments. IET Inform. Secur. 2010, 4(4):301-321.
-
(2010)
IET Inform. Secur.
, vol.4
, Issue.4
, pp. 301-321
-
-
Amini, M.1
Jalili, R.2
-
41
-
-
78751701691
-
Ontology driven health information systems architectures enable pHealth for empowered patients
-
Blobel B. Ontology driven health information systems architectures enable pHealth for empowered patients. Int. J. Med. Inform. 2011, 80(2):e17-e25.
-
(2011)
Int. J. Med. Inform.
, vol.80
, Issue.2
-
-
Blobel, B.1
-
42
-
-
84870557157
-
-
Eclipse: Eclipse Modeling Framework (EMF). Available from:
-
Eclipse: Eclipse Modeling Framework (EMF). Available from: http://www.eclipse.org/emf/.
-
-
-
-
43
-
-
79952267930
-
Evaluation of development tools for domain-specific modeling languages
-
LNCS
-
Amyot D., Farah H., Roy J.F. Evaluation of development tools for domain-specific modeling languages. Lect. Notes Comput. Sci. 2006, 4320 LNCS:183-197.
-
(2006)
Lect. Notes Comput. Sci.
, vol.4320
, pp. 183-197
-
-
Amyot, D.1
Farah, H.2
Roy, J.F.3
-
44
-
-
84870503952
-
-
Eclipse: Graphical Modeling Framework (GMF). Available from:
-
Eclipse: Graphical Modeling Framework (GMF). Available from: http://www.eclipse.org/gmf/.
-
-
-
-
46
-
-
84870547265
-
-
MOFScript. Available from:
-
MOFScript. Available from: http://www.eclipse.org/gmt/mofscript/.
-
-
-
-
47
-
-
84870527220
-
-
Model-to-Text (M2T) project. Available from:
-
Model-to-Text (M2T) project. Available from: http://www.eclipse.org/modeling/m2t/.
-
-
-
-
50
-
-
19944382845
-
Privacy in information technology: designing to enable privacy policy management in organizations
-
Karat J., Karat C.M., Brodie C., Feng J. Privacy in information technology: designing to enable privacy policy management in organizations. Int. J. Hum. Comput. Stud. 2005, 63(1-2):153-174.
-
(2005)
Int. J. Hum. Comput. Stud.
, vol.63
, Issue.1-2
, pp. 153-174
-
-
Karat, J.1
Karat, C.M.2
Brodie, C.3
Feng, J.4
-
51
-
-
84870561530
-
-
Jess rule engine. Available from:
-
Jess rule engine. Available from: http://www.jessrules.com/jess/index.shtml.
-
-
-
-
54
-
-
84870572799
-
-
The Systematized Nomenclature of Medicine (SNOMED). Available from:
-
The Systematized Nomenclature of Medicine (SNOMED). Available from: http://www.ihtsdo.org/snomed-ct/.
-
-
-
-
55
-
-
84870567885
-
-
OBO Foundry. The Open Biological and Biomedical Ontologies. Available from:
-
OBO Foundry. The Open Biological and Biomedical Ontologies. Available from: http://www.obofoundry.org/.
-
-
-
-
56
-
-
84870547949
-
-
Emfatic Language Reference. Available from:
-
Emfatic Language Reference. Available from: http://www.eclipse.org/gmt/epsilon/doc/articles/emfatic/.
-
-
-
-
57
-
-
84870554848
-
-
Epsilon Validation Language (EVL). Available from:
-
Epsilon Validation Language (EVL). Available from: http://www.eclipse.org/gmt/epsilon/doc/evl/.
-
-
-
|