Proceedings of the First ACM Workshop on Role-Based Access Control - RBAC '95 1996
DOI: 10.1145/270152.270180
|View full text |Cite
|
Sign up to set email alerts
|

Security and confidentiality in health care informatics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2008
2008
2009
2009

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…These investigations stem from organizing the framework of healthcare networks to allow for secure transfer of EMRs [7,[10][11][12] to the specific detail in creating an HL7 web-based application to view the patient's medical and billing information [3].…”
Section: Related Workmentioning
confidence: 99%
“…These investigations stem from organizing the framework of healthcare networks to allow for secure transfer of EMRs [7,[10][11][12] to the specific detail in creating an HL7 web-based application to view the patient's medical and billing information [3].…”
Section: Related Workmentioning
confidence: 99%