@dblp

Using Access Control to Mitigate Insider Threats to Healthcare Systems.

, , und . ICHI, Seite 55-60. IEEE Computer Society, (2016)

Links und Ressourcen

Tags