Testing Policy-Based e-Health Monitoring Processes Using TTCN-3
暂无分享,去创建一个
[1] Stan Matwin,et al. Challenges of Composing XACML Policies , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.
[2] Stan Matwin,et al. A non-technical XACML target editor for dynamic access control systems , 2014, 2014 International Conference on Collaboration Technologies and Systems (CTS).
[3] David F. Ferraiolo,et al. Guide to Attribute Based Access Control (ABAC) Definition and Considerations , 2014 .
[4] Diana Vega. Towards an Automated and Dynamically Adaptable Test System for Testing Healthcare Information Systems , 2010, 2010 Third International Conference on Software Testing, Verification and Validation.
[5] Liam Peyton,et al. Policy-based Data Integration for e-Health Monitoring Processes in a B2B Environment: Experiences from Canada , 2010, J. Theor. Appl. Electron. Commer. Res..
[6] Stan Matwin,et al. Strategies for Reducing Risks of Inconsistencies in Access Control Policies , 2010, 2010 International Conference on Availability, Reliability and Security.
[7] Ina Schieferdecker,et al. Application of TTCN-3 test language to testing information systems in eHealth domain , 2010, 2010 International Conference on Multimedia Computing and Information Technology (MCIT).
[8] Liam Peyton,et al. A Framework for Continuous Compliance Monitoring of eHealth Processes , 2009, 2009 World Congress on Privacy, Security, Trust and the Management of e-Business.
[9] Michael Weiss,et al. E-Technologies: Innovation in an Open World, 4th International Conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009. Proceedings , 2009, MCETECH.
[10] Stan Matwin,et al. A Non-technical User-Oriented Display Notation for XACML Conditions , 2009, MCETECH.
[11] Tao Xie,et al. Multiple-implementation testing for XACML implementations , 2008, TAV-WEB '08.
[12] Liam Peyton,et al. Integration Testing of Composite Applications , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[13] Liam Peyton,et al. Trusted Information Processes in B2B Networks , 2008, ICEIS.
[14] L. Peyton,et al. Addressing Privacy in a Federated Identity Management Network for EHealth , 2007, Eighth World Congress on the Management of eBusiness (WCMeB 2007).
[15] Francisco Curbera,et al. Web Services Business Process Execution Language Version 2.0 , 2007 .
[16] K. Mani Chandy,et al. Event-Driven Architectures and Complex Event Processing , 2006, 2006 IEEE International Conference on Services Computing (SCC'06).
[17] Helen Nissenbaum,et al. Privacy and contextual integrity: framework and applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[18] Steve Graham,et al. Events and service-oriented architecture: The OASIS Web Services Notification specification , 2005, IBM Syst. J..
[19] Munindar P. Singh,et al. Service-Oriented Computing: Key Concepts and Principles , 2005, IEEE Internet Comput..
[20] E. James Whitehead. WebDAV: Versatile Collaboration Multiprotocol , 2005, IEEE Internet Comput..
[21] Gerd Wagner,et al. Trends & controversies - Where are the rules? , 2003, IEEE Intelligent Systems.
[22] Anne-Marie Kermarrec,et al. The many faces of publish/subscribe , 2003, CSUR.
[23] Ian T. Foster,et al. Grid Services for Distributed System Integration , 2002, Computer.
[24] Alexandra Poulovassilis,et al. An event-condition-action language for XML , 2002, WWW '02.
[25] D. Zwart. [What are the rules?]. , 1995, Tijdschrift voor diergeneeskunde.