Testing Policy-Based e-Health Monitoring Processes Using TTCN-3

[1]  Stan Matwin,et al.  Challenges of Composing XACML Policies , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.

[2]  Stan Matwin,et al.  A non-technical XACML target editor for dynamic access control systems , 2014, 2014 International Conference on Collaboration Technologies and Systems (CTS).

[3]  David F. Ferraiolo,et al.  Guide to Attribute Based Access Control (ABAC) Definition and Considerations , 2014 .

[4]  Diana Vega Towards an Automated and Dynamically Adaptable Test System for Testing Healthcare Information Systems , 2010, 2010 Third International Conference on Software Testing, Verification and Validation.

[5]  Liam Peyton,et al.  Policy-based Data Integration for e-Health Monitoring Processes in a B2B Environment: Experiences from Canada , 2010, J. Theor. Appl. Electron. Commer. Res..

[6]  Stan Matwin,et al.  Strategies for Reducing Risks of Inconsistencies in Access Control Policies , 2010, 2010 International Conference on Availability, Reliability and Security.

[7]  Ina Schieferdecker,et al.  Application of TTCN-3 test language to testing information systems in eHealth domain , 2010, 2010 International Conference on Multimedia Computing and Information Technology (MCIT).

[8]  Liam Peyton,et al.  A Framework for Continuous Compliance Monitoring of eHealth Processes , 2009, 2009 World Congress on Privacy, Security, Trust and the Management of e-Business.

[9]  Michael Weiss,et al.  E-Technologies: Innovation in an Open World, 4th International Conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009. Proceedings , 2009, MCETECH.

[10]  Stan Matwin,et al.  A Non-technical User-Oriented Display Notation for XACML Conditions , 2009, MCETECH.

[11]  Tao Xie,et al.  Multiple-implementation testing for XACML implementations , 2008, TAV-WEB '08.

[12]  Liam Peyton,et al.  Integration Testing of Composite Applications , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[13]  Liam Peyton,et al.  Trusted Information Processes in B2B Networks , 2008, ICEIS.

[14]  L. Peyton,et al.  Addressing Privacy in a Federated Identity Management Network for EHealth , 2007, Eighth World Congress on the Management of eBusiness (WCMeB 2007).

[15]  Francisco Curbera,et al.  Web Services Business Process Execution Language Version 2.0 , 2007 .

[16]  K. Mani Chandy,et al.  Event-Driven Architectures and Complex Event Processing , 2006, 2006 IEEE International Conference on Services Computing (SCC'06).

[17]  Helen Nissenbaum,et al.  Privacy and contextual integrity: framework and applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[18]  Steve Graham,et al.  Events and service-oriented architecture: The OASIS Web Services Notification specification , 2005, IBM Syst. J..

[19]  Munindar P. Singh,et al.  Service-Oriented Computing: Key Concepts and Principles , 2005, IEEE Internet Comput..

[20]  E. James Whitehead WebDAV: Versatile Collaboration Multiprotocol , 2005, IEEE Internet Comput..

[21]  Gerd Wagner,et al.  Trends & controversies - Where are the rules? , 2003, IEEE Intelligent Systems.

[22]  Anne-Marie Kermarrec,et al.  The many faces of publish/subscribe , 2003, CSUR.

[23]  Ian T. Foster,et al.  Grid Services for Distributed System Integration , 2002, Computer.

[24]  Alexandra Poulovassilis,et al.  An event-condition-action language for XML , 2002, WWW '02.

[25]  D. Zwart [What are the rules?]. , 1995, Tijdschrift voor diergeneeskunde.