Author:
Chryssanthou Anargyros,Varlamis Iraklis,Latsiou Charikleia
Reference53 articles.
1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.
2. Apostolakis, I., Chryssanthou, A., & Varlamis, I. (2009). A holistic perspective of security in health related virtual communities. In A. Lazakidou & K. Siassiakos (Eds.), Handbook of research on distributed medical informatics and E-health (pp. 367–381). Hershey, PA: IGI Global.
3. Article 29 Data Protection Working Party. (2010, February). Opinion 1/2010 on the concepts of “controller” and “processor”. Brussels, Belgium.
4. Becker, M. Y., Fournet, C., & Gordon, A. D. (2007, July 6–8). Design and semantics of a decentralized authorization language. In Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF 07), Venice, Italy (pp. 3–15). Washington, DC: IEEE Computer Society.
5. Becker, M. Y., & Sewell, P. (2004, June 28–30). Cassandra: Flexible trust management applied to electronic health records. In Proceedings of the 17th IEEE Workshop on Computer Security Foundations; Asilomar Conference Center, CA, USA, 2004 (pp. 139–154). Washington, DC: IEEE.