Author of the publication

Design of Secure Distributed Medical Database Systems.

, , and . DEXA, volume 1460 of Lecture Notes in Computer Science, page 492-500. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure mobile agent environments: modelling role assignments., , and . Int. J. Electron. Secur. Digit. Forensics, 1 (3): 249-267 (2008)Healthcare teams over the Internet: programming a certificate-based approach., , and . Int. J. Medical Informatics, 70 (2-3): 161-171 (2003)Design of Secure Distributed Medical Database Systems., , and . DEXA, volume 1460 of Lecture Notes in Computer Science, page 492-500. Springer, (1998)A tutorial on secure database systems.. Inf. Softw. Technol., 36 (12): 717-724 (1994)Integrating Object Oriented Technology and Security in Medical Database Systems.. Security for Object-Oriented Systems, page 11-24. Springer, (1993)Flexible team-based access control using contexts., , , and . SACMAT, page 21-27. ACM, (2001)Logical design of data base systems.. Inf. Manag., 17 (1): 23-29 (1989)eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features., , and . DBSec, volume 171 of IFIP Conference Proceedings, page 63-78. Kluwer, (1999)Design of secure medical database systems., and . SEC, volume 54 of IFIP Conference Proceedings, page 387-401. Chapman & Hall, (1996)Securing Healthgrid Environments., , , and . SECRYPT, page 394-401. INSTICC Press, (2007)