Author:
Bohn Jürgen,Gärtner Felix,Vogt Harald
Publisher
Springer Berlin Heidelberg
Reference39 articles.
1. Agency for Healthcare Research and Quality (February 2003), http://www.ahcpr.gov/qual/errorsix.htm
2. Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., Stoner, E.: State of the Practice of Intrusion Detection Technologies. Technical Report CMU/SEI-99TR-028, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213-3890, USA (2000)
3. American Accounting Association (AAA), Home page http://accounting.rutgers.edu/raw/aaa/
4. Anderson, R.J.: A Security Policy Model for Clinical Information Systems. In: IEEE Symposium on Security and Privacy (1996)
5. Arens, A.A., Loebbecke, J.K.: Auditing: An Integrated Approach, 8th edn. Prentice-Hall, Englewood Cliffs (1999)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献