共 17 条
- [1] A security policy model for clinical information systems [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 30 - 43
- [2] [Anonymous], IMIA COD ETH HLTH IN
- [3] [Anonymous], 2010, PROC 9 ANN ACM WORKS, DOI [10.1145/1866919.1866930, DOI 10.1145/1866919.1866930]
- [4] [Anonymous], 2004, W3C Constraints and Capabilities Workshop, V9, P1
- [5] Backes M, 2003, LECT NOTES COMPUT SC, V2808, P162
- [6] Privacy and contextual integrity: Framework and applications [J]. 2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 184 - +
- [7] Developing enterprise web services and applications: Opportunities and best practices for the healthcare industry [J]. HEALTHCOM 2003, PROCEEDINGS, 2003, : 159 - 159
- [8] Cranor L., 2002, ACM workshop on Privacy in the Electronic Society, P1, DOI DOI 10.1145/644527.644528
- [9] David R. C., 2007, ROLE BASED ACCESS CO, P148
- [10] Dwyer SamuelJ., 2004, Security Issues in the Digital Medical Enterprise, V72, P9