Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A tutorial on secure database systems.. Inf. Softw. Technol., 36 (12): 717-724 (1994)Design of Secure Distributed Medical Database Systems., , and . DEXA, volume 1460 of Lecture Notes in Computer Science, page 492-500. Springer, (1998)Healthcare teams over the Internet: programming a certificate-based approach., , and . Int. J. Medical Informatics, 70 (2-3): 161-171 (2003)Secure mobile agent environments: modelling role assignments., , and . Int. J. Electron. Secur. Digit. Forensics, 1 (3): 249-267 (2008)Integrating Object Oriented Technology and Security in Medical Database Systems.. Security for Object-Oriented Systems, page 11-24. Springer, (1993)Flexible team-based access control using contexts., , , and . SACMAT, page 21-27. ACM, (2001)Design of secure medical database systems., and . SEC, volume 54 of IFIP Conference Proceedings, page 387-401. Chapman & Hall, (1996)eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features., , and . DBSec, volume 171 of IFIP Conference Proceedings, page 63-78. Kluwer, (1999)Logical design of data base systems.. Inf. Manag., 17 (1): 23-29 (1989)Implementing Authentication (LAP) and Monitoring in Healthcare Information Systems., and . Health Informatics J., 9 (2): 79-87 (2003)