Published on in Vol 3, No 1 (2001):

Access Control based on Attribute Certificates for Medical Intranet Applications

Access Control based on Attribute Certificates for Medical Intranet Applications

Access Control based on Attribute Certificates for Medical Intranet Applications

Journals

  1. Ferrer-Roca O, Marcano F, Diaz-Cardama A. Quality labels for e-health. IET Communications 2008;2(2):202 View
  2. Demurjian S, Algarín A, Bi J, Berhe S, Agresta T, Wang X, Blechner M. A Viewpoint of Security for Digital Health Care in the United States. International Journal of Privacy and Health Information Management 2014;2(1):1 View
  3. Zhao J, Kang J, Li T. A Flexible Workflow Model of Role Based Access Control. Applied Mechanics and Materials 2015;733:784 View
  4. Nicolaysen T, Sassoon R, Line M, Jaatun M. Agile Software Development. International Journal of Secure Software Engineering 2010;1(3):71 View
  5. Bakkiam Deebak D, AL‐Turjman F. Lightweight privacy‐aware secure authentication scheme for cyber‐physical systems in the edge intelligence era. Concurrency and Computation: Practice and Experience 2023;35(13) View

Books/Policy Documents

  1. Demurjian S, Algarín A, Bi J, Berhe S, Agresta T, Wang X, Blechner M. E-Health and Telemedicine. View
  2. Sanzi E, Demurjian S, Agresta T, Murphy A. Mobile Application Development, Usability, and Security. View
  3. Nicolaysen T, Sassoon R, Line M, Jaatun M. Security-Aware Systems Applications and Software Development Methods. View
  4. Sanzi E, Demurjian S. Innovative Solutions for Access Control Management. View
  5. Demurjian S, Algarín A, Bi J, Berhe S, Agresta T, Wang X, Blechner M. Healthcare Ethics and Training. View

Conference Proceedings

  1. Sasson R, Jaatun M, Jensen J. 2010 International Conference on Availability, Reliability and Security. The Road to Hell is Paved with Good Intentions: A Story of (In)secure Software Development View
  2. Sanzi E, Demurjian S, Billings J. 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). Integrating Trust Profiles, Trust Negotiation, and Attribute Based Access Control View
  3. Hung P, Andrade J, Chen Y, Huang R, Martin M, Zheng Y. 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07). Research Issues of Privacy Access Control Model for Mobile Ad Hoc Healthcare Applications with XACML View
  4. Izaara A, Ssembatya R, Kaggwa F. 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). An Access Control Framework for Protecting Personal Electronic Health Records View