Author of the publication

An Access Control Architecture for Protecting Health Information Systems.

, , and . 3PGCIC, volume 1 of Lecture Notes on Data Engineering and Communications Technologies, page 35-47. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An access control model for easy management of patient privacy in EHR systems., and . ICITST, page 463-470. IEEE, (2013)Semantic Information Retrieval from Patient Summaries., , and . 3PGCIC, volume 1 of Lecture Notes on Data Engineering and Communications Technologies, page 349-360. Springer, (2016)A View-Based Acces Control Model for EHR Systems., , and . IDC, volume 570 of Studies in Computational Intelligence, page 443-452. Springer, (2014)Overview of the SMART-BEAR Technical Infrastructure., , , , , , , , , and 7 other author(s). ICT4AWE, page 117-125. SCITEPRESS, (2022)The SMART BEAR Project: An Overview of Its Infrastructure., , , , , , , , , and 7 other author(s). ICT4AWE (Revised Selected Papers), volume 1856 of Communications in Computer and Information Science, page 408-425. Springer, (2022)An Access Control Architecture for Protecting Health Information Systems., , and . 3PGCIC, volume 1 of Lecture Notes on Data Engineering and Communications Technologies, page 35-47. Springer, (2016)Addressing Security Issues of Electronic Health Record Systems through Enhanced SIEM Technology., , , and . ARES, page 646-653. IEEE Computer Society, (2013)On Securing Communications among Federated Health Information Systems., , , , , , and . SAFECOMP Workshops, volume 7613 of Lecture Notes in Computer Science, page 235-246. Springer, (2012)An Hybrid Architecture to Enhance Attacks Detection on IT infrastructure., , , and . IDC, volume 570 of Studies in Computational Intelligence, page 437-442. Springer, (2014)A Patient Centric Approach for Modeling Access Control in EHR Systems., , and . ICA3PP (2), volume 8286 of Lecture Notes in Computer Science, page 225-232. Springer, (2013)