Author of the publication

Design of Secure Distributed Medical Database Systems.

, , and . DEXA, volume 1460 of Lecture Notes in Computer Science, page 492-500. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure mobile agent environments: modelling role assignments., , and . Int. J. Electron. Secur. Digit. Forensics, 1 (3): 249-267 (2008)Design of Secure Distributed Medical Database Systems., , and . DEXA, volume 1460 of Lecture Notes in Computer Science, page 492-500. Springer, (1998)Healthcare teams over the Internet: programming a certificate-based approach., , and . Int. J. Medical Informatics, 70 (2-3): 161-171 (2003)A tutorial on secure database systems.. Inf. Softw. Technol., 36 (12): 717-724 (1994)Flexible team-based access control using contexts., , , and . SACMAT, page 21-27. ACM, (2001)Integrating Object Oriented Technology and Security in Medical Database Systems.. Security for Object-Oriented Systems, page 11-24. Springer, (1993)Security Model for XML Data., , and . International Conference on Internet Computing (1), page 400-406. CSREA Press, (2001)Security Guidelines for Database Systems Development.. DBSec, volume A-60 of IFIP Transactions, page 353-370. North-Holland, (1994)The new Greek national e-prescription system: an effective tool for improving quality of care and containing medication costs., , and . ICIMTH, volume 190 of Studies in Health Technology and Informatics, page 13-17. IOS Press, (2013)Logical design of data base systems.. Inf. Manag., 17 (1): 23-29 (1989)