Author of the publication

Access control management with provenance in healthcare environments.

, , , , and . CSCWD, page 545-550. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Glance on Current XML Twig Pattern Matching Algorithms., and . ICCSA (2), volume 5073 of Lecture Notes in Computer Science, page 307-321. Springer, (2008)Ubiquitous computing environments and its usage access control., , and . Infoscale, volume 152 of ACM International Conference Proceeding Series, page 6. ACM, (2006)Unobtrusive Mattress-Based Identification of Hypertension by Integrating Classification and Association Rule Mining., , , , , and . Sensors, 19 (7): 1489 (2019)An Attention-based Hybrid LSTM-CNN Model for Arrhythmias Classification., , , , , , and . IJCNN, page 1-8. IEEE, (2019)Flexible and Semantics-Based Support for Web Services Transaction Protocols., and . GPC, volume 5036 of Lecture Notes in Computer Science, page 492-503. Springer, (2008)Graph-Based Semantic Query Optimization for Intensional XML Data., , and . CISIS, volume 993 of Advances in Intelligent Systems and Computing, page 247-256. Springer, (2019)Relevant Answers for XML Keyword Search: A Skyline Approach., and . WISE, volume 6488 of Lecture Notes in Computer Science, page 216-224. Springer, (2010)Effective pruning for XML structural match queries., , and . Data Knowl. Eng., 69 (6): 640-659 (2010)Set-Based Adaptive Distributed Differential Evolution for Anonymity-Driven Database Fragmentation., , , , and . Data Sci. Eng., 6 (4): 380-391 (2021)A Consumer Scalable Anonymity Payment Scheme with Role-Based Access Control., , and . WISE (1), page 53-62. IEEE Computer Society, (2001)