共 50 条
- [1] Security Policy Model for Ubiquitous Social Systems [J]. MODELING AND USING CONTEXT (CONTEXT 2017), 2017, 10257 : 302 - 314
- [2] Towards Ubiquitous and Pervasive Healthcare [J]. ADVANCED METHODS AND APPLICATIONS IN COMPUTATIONAL INTELLIGENCE, 2014, 6 : 387 - 404
- [3] Security policy development for healthcare information systems [J]. ADVANCED HEALTH TELEMATICS AND TELEMEDICINE: THE MAGDEBURG EXPERT SUMMIT TEXTBOOK, 2003, 96 : 105 - 110
- [4] Towards ubiquitous cooperative security [J]. 2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 103 - 110
- [5] Towards Autonomic Security Management of Healthcare Information Systems [J]. 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2016, : 113 - 118
- [7] Baseline security policy for distributed healthcare information systems [J]. Comput Secur, 8 (709-719):
- [8] Towards provable security for ubiquitous applications [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 295 - 312
- [10] Position paper: Security in TACOMA [J]. OBJECT-ORIENTED TECHNOLOGY: ECOOP'98 WORKSHOP READER, 1998, 1543 : 302 - 303