From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Protecting clinical data on Web client computers: the PCASSO approach., и . AMIA, AMIA, (1998)PCASSO: Applying and Extending State-of-the-Art Security in the Healthcare Domain., , и . ACSAC, стр. 251-. IEEE Computer Society, (1997)Research Paper: Giving Patients Access to Their Medical Records via the Internet: The PCASSO Experience., , , и . JAMIA, 9 (2): 181-191 (2002)Evaluating and classifying the readiness of technology specifications for national standardization., , и . J. Am. Medical Informatics Assoc., 22 (3): 738-743 (2015)Fortresses built upon sand.. NSPW, стр. 148-153. ACM, (1996)Assurance: the power behind PCASSO security., , , и . AMIA, AMIA, (1999)Privacy-Preserving Linkage of Genomic and Clinical Data Sets., , , , , , и . IEEE ACM Trans. Comput. Biol. Bioinform., 16 (4): 1342-1348 (2019)Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety.. ACSAC, стр. 3-22. IEEE Computer Society, (2006)PCASSO: a design for secure communication of personal health information via the internet., и . Int. J. Medical Informatics, 54 (2): 97-104 (1999)The evolved threat paradigm: look who's wearing the black hats!. NSPW, стр. 126-130. ACM, (1993)