Author:
Bhartiya Shalini,Mehrotra Deepti,Girdhar Anup
Reference24 articles.
1. Techniques and algorithms for access control list optimization;Al-Abdulmohsin;Comput. Electr. Eng.,2009
2. Towards ensuring scalability, interoperability and efficient access control in a multi-domain grid-based environment;Azeez;SAIEE Africa Res. J.,2013
3. Bertino, E., Kim, W., Rabitti, F., Woelk, D., 1994. A model of authorization model for object-oriented databases, In: Biskup, J., Morgenstern, M., Landwehr, C.E. (Eds.), Database Security, vol. VIII, pp. 199–222.
4. Bhartiya, S., Mehrotra, D., 2013. Exploring Interoperability and Challenges in Healthcare Data Exchange. In: Smart Health, International Conference, ICSH 2013 Proceedings, Lecture Notes in Computer Science, 8040, pp. 52–65
5. Applying CHAID Algorithm to Investigate Critical Attributes of Secured Interoperable Health Data Exchange;Bhartiya;Int. J. Electronic. Healthcare,2015
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献