The Extended Authentication Process in the Environment of the Laboratory Information and Management System
暂无分享,去创建一个
[1] Sean Ekins. Computer Applications in Pharmaceutical Research and Development: Ekins/Computer Applications in Pharmaceutical Research and Development , 2006 .
[2] Yu Hu. Development of Information Management System Used in Laboratory , 2012 .
[3] Jianfeng Ma,et al. A privacy preserving three-factor authentication protocol for e-Health clouds , 2016, The Journal of Supercomputing.
[4] Y. Sreenivasa Rao,et al. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption , 2015, ICISS.
[5] Leonard Steinborn,et al. International Organization for Standardization ISO/IEC 17025 General Requirements for the Competence of Testing and Calibration Laboratories , 2004 .
[6] Ondrej Krejcar,et al. Development of information and management system for laboratory based on open source licensed software with security logs extension , 2017, J. Intell. Fuzzy Syst..
[7] Noboru Sonehara,et al. Aspects of privacy for electronic health records , 2011, Int. J. Medical Informatics.
[8] Ondrej Krejcar,et al. Development of Information and Management System for Laboratory Based on Open Source Licensed Software , 2015, ICCCI.
[9] Ondrej Krejcar,et al. Increasing of Data Security and Workflow Optimization in Information and Management System for Laboratory , 2017, IWBBIO.
[10] Poonam J. Prasad,et al. Trends in laboratory information management system , 2012 .
[11] Tong Liu,et al. Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data , 2015, IWSEC.
[12] Sean Ekins,et al. Computer Applications in Pharmaceutical Research and Development , 2008 .
[13] M.D. Wang,et al. Development of a Laboratory Information System for Cancer Collaboration Projects , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[14] B. Shneiderman,et al. Improving the accuracy of touch screens: an experimental evaluation of three strategies , 1988, CHI '88.
[15] Svenja Polst,et al. Why Users Ignore Privacy Policies - A Survey and Intention Model for Explaining User Privacy Behavior , 2018, HCI.
[16] Vladimir Sobeslav,et al. Security information and event management in the cloud computing infrastructure , 2014, 2014 IEEE 15th International Symposium on Computational Intelligence and Informatics (CINTI).
[17] Viktor Taneski,et al. Moore's curse on textual passwords , 2015, 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[18] Alawi A. Al-saggaf. Key binding biometrics-based remote user authentication scheme using smart cards , 2017, IET Biom..
[19] Joseph K. Liu,et al. A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing , 2015, Future Gener. Comput. Syst..
[20] Stanislav Mamonov,et al. The impact of information security threat awareness on privacy-protective behaviors , 2018, Comput. Hum. Behav..
[21] Ondrej Krejcar,et al. Concept of a Module for Physical Security of Material Secured by LIMS , 2018, IWBBIO.
[22] Miloslav Hub,et al. Usability versus security of authentication , 2010 .
[23] Jürgen Durner,et al. The future of the laboratory information system – what are the requirements for a powerful system for a laboratory data management? , 2014, Clinical chemistry and laboratory medicine.
[24] E. Lucile White,et al. A Successful LIMS Implementation: Case Study at Southern Research Institute , 2007 .
[25] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.