Published on in Vol 3, No 1 (2001):
Journals
- Ferrer-Roca O, Marcano F, Diaz-Cardama A. Quality labels for e-health. IET Communications 2008;2(2):202 View
- Demurjian S, Algarín A, Bi J, Berhe S, Agresta T, Wang X, Blechner M. A Viewpoint of Security for Digital Health Care in the United States. International Journal of Privacy and Health Information Management 2014;2(1):1 View
- Zhao J, Kang J, Li T. A Flexible Workflow Model of Role Based Access Control. Applied Mechanics and Materials 2015;733:784 View
- Nicolaysen T, Sassoon R, Line M, Jaatun M. Agile Software Development. International Journal of Secure Software Engineering 2010;1(3):71 View
- Bakkiam Deebak D, AL‐Turjman F. Lightweight privacy‐aware secure authentication scheme for cyber‐physical systems in the edge intelligence era. Concurrency and Computation: Practice and Experience 2023;35(13) View
Books/Policy Documents
- Demurjian S, Algarín A, Bi J, Berhe S, Agresta T, Wang X, Blechner M. E-Health and Telemedicine. View
- Sanzi E, Demurjian S, Agresta T, Murphy A. Mobile Application Development, Usability, and Security. View
- Nicolaysen T, Sassoon R, Line M, Jaatun M. Security-Aware Systems Applications and Software Development Methods. View
- Sanzi E, Demurjian S. Innovative Solutions for Access Control Management. View
- Demurjian S, Algarín A, Bi J, Berhe S, Agresta T, Wang X, Blechner M. Healthcare Ethics and Training. View