The design and implementation of a novel security model for HealthAgents
暂无分享,去创建一个
Liang Xiao | Madalina Croitoru | Paul H. Lewis | Horacio González-Vélez | Bo Hu | David Dupplaw | Magí Lluch i Ariet | Juan Martínez-Miranda | Francesc Estanyol | Alex Gibb | Srinandan Dasmahapatra | Andrew Peet
[1] Liang Xiao,et al. Adaptive Agent Model: Software Adaptivity using an Agent-oriented Model-Driven Architecture , 2009, Inf. Softw. Technol..
[2] Charles P. Pfleeger,et al. Security in computing , 1988 .
[3] Liang Xiao,et al. Towards agent-oriented model-driven architecture , 2007, Eur. J. Inf. Syst..
[4] Ross J. Anderson,et al. Clinical system security: interim guidelines , 1996, BMJ.
[5] Gail-Joon Ahn,et al. A role-based delegation framework for healthcare information systems , 2002, SACMAT '02.
[6] R Anderson. Undermining data privacy in health information , 2001, BMJ : British Medical Journal.
[7] Sabine Van Huffel,et al. HealthAgents: distributed multi-agent brain tumor diagnosis and prognosis , 2009, Applied Intelligence.
[8] David Stuart Robertson,et al. A Lightweight Coordination Calculus for Agent Systems , 2004, DALT.
[9] Stefan Kirn,et al. Agent.Hospital - agent-based open framework for clinical applications , 2003, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003..
[10] J. Ferlay,et al. Estimates of cancer incidence and mortality in Europe in 1995. , 2002, European journal of cancer.
[11] Liang Xiao,et al. Secure Interaction Models for the HealthAgents System , 2008, SAFECOMP.
[12] Sun K. Yoo,et al. Web-based secure access from multiple patient repositories , 2008, Int. J. Medical Informatics.
[13] Liang Xiao,et al. Developing a security protocol for a distributed decision support system in a healthcare environment , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[14] Liang Xiao,et al. An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[15] Costas Lambrinoudakis,et al. A security architecture for interconnecting health information systems , 2004, Int. J. Medical Informatics.
[16] J. Keese,et al. Pro-active approach to malware for healthcare information and imaging systems , 2005 .
[17] Liang Xiao,et al. Expressive security policy rules using Layered Conceptual Graphs , 2007, Knowl. Based Syst..
[18] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[19] Angela Sasse,et al. Humans in the Loop Human – Computer Interaction and Security , 2022 .
[20] Walter F. Tichy,et al. Proceedings 25th International Conference on Software Engineering , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..
[21] L. Johnson,et al. Minimum Security Requirements for Federal Information and Information Systems , 2006 .