Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility
暂无分享,去创建一个
Sushil Jajodia | Vipin Swarup | Kenneth P. Smith | Donald B. Faatz | Todd Cornett | Kenneth P. Smith | Jeffrey Hoyt | Gail Hamilton | S. Jajodia | Vipin Swarup | D. Faatz | Jeffrey Hoyt | Gail Hamilton | Todd Cornett
[1] Perry L. Miller,et al. Application of Information Technology: Organization of Heterogeneous Scientific Data Using the EAV/CR Representation , 1999, J. Am. Medical Informatics Assoc..
[2] Leo Obrst,et al. Unpacking the semantics of source and usage to perform semantic reconciliation in large-scale information systems , 1999, SGMD.
[3] M. Torrens. Co-Planar Stereotaxic Atlas of the Human Brain—3-Dimensional Proportional System: An Approach to Cerebral Imaging, J. Talairach, P. Tournoux. Georg Thieme Verlag, New York (1988), 122 pp., 130 figs. DM 268 , 1990 .
[4] Bertram Ludäscher,et al. Knowledge-based integration of neuroscience data sources , 2000, Proceedings. 12th International Conference on Scientific and Statistica Database Management.
[5] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[6] Daniel Gardner,et al. Model Formulation: Common Data Model for Neuroscience Data and Data Model Exchange , 2001, J. Am. Medical Informatics Assoc..
[7] José L. V. Mejino,et al. Foundational model of neuroanatomy: implications for the Human Brain Project , 2001, AMIA.
[8] Marianne Winslett,et al. Entity Modeling in the MLS Relational Model , 1992, VLDB.
[9] Sushil Jajodia,et al. Correctness Criteria for Multilevel Secure Transactions , 1996, IEEE Trans. Knowl. Data Eng..
[10] Arthur W. Toga,et al. Managing multiple medical image file formats and conventions , 2003, SPIE Medical Imaging.
[11] T. Toda,et al. Neuroscience in the post-genome era. , 2003, Nature neuroscience.
[12] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[13] Alexander S. Szalay,et al. The world-wide telescope , 2001, CACM.
[14] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[15] Stephen H. Koslow,et al. Should the neuroscience community make a paradigm shift to sharing primary data? , 2000, Nature Neuroscience.
[16] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[17] Martin S. Olivier,et al. Database and Application Security XV , 2002, IFIP — The International Federation for Information Processing.
[18] M. Brian Blake,et al. Using Component-Based Development and Web Technologies to Support a Distributed Data Management System , 2002, Ann. Softw. Eng..
[19] Sushil Jajodia,et al. Recent advances in access control models , 2001 .
[20] Michael S. Gazzaniga,et al. Databasing fMRI studies — towards a 'discovery science' of brain function , 2002, Nature Reviews Neuroscience.
[21] A. Toga. Neuroimage databases: The good, the bad and the ugly , 2002, Nature Reviews Neuroscience.
[22] Arnon Rosenthal,et al. XML's Impact on Databases and Data Sharing , 2001, Computer.
[23] Alan C. Evans,et al. Enhancement of MR Images Using Registration for Signal Averaging , 1998, Journal of Computer Assisted Tomography.
[24] Sushil Jajodia,et al. Toward a multilevel secure relational data model , 1991, SIGMOD '91.
[25] G. Jeffrey Robinette,et al. Track 3: An Integrated Approach to Risk Management and Risk Assessment , 2001 .
[26] Stephen H Koslow,et al. Sharing primary data: a threat or asset to discovery? , 2002, Nature Reviews Neuroscience.
[27] Brandon Dixon,et al. A Belief-Consistent Multilevel Secure Relational Data Model , 1999, Inf. Syst..
[28] P. Fox,et al. Mapping context and content: the BrainMap model , 2002, Nature Reviews Neuroscience.