Search dblp for Publications

export results for "toc:db/series/shti/shti31.bht:"

 download as .bib file

@book{DBLP:series/shti/31,
  title        = {Data Security for Health Care - Volume {I:} Management Guidelines},
  series       = {Studies in Health Technology and Informatics},
  volume       = {31},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=23322},
  isbn         = {978-90-5199-264-9},
  timestamp    = {Mon, 19 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/shti/31.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/Bleumer96a,
  author       = {Gerrit Bleumer},
  title        = {Introduction to the {SEISMED} Guidelines},
  booktitle    = {Data Security for Health Care - Volume {I:} Management Guidelines},
  series       = {Studies in Health Technology and Informatics},
  volume       = {31},
  pages        = {1--10},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-875-5-1},
  doi          = {10.3233/978-1-60750-875-5-1},
  timestamp    = {Mon, 19 Mar 2018 07:49:39 +0100},
  biburl       = {https://dblp.org/rec/series/shti/Bleumer96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/Bleumer96b,
  author       = {Gerrit Bleumer},
  title        = {Annex: Guideline for Cryptographic Mechanisms for Health Care Management},
  booktitle    = {Data Security for Health Care - Volume {I:} Management Guidelines},
  series       = {Studies in Health Technology and Informatics},
  volume       = {31},
  pages        = {227--234},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-875-5-227},
  doi          = {10.3233/978-1-60750-875-5-227},
  timestamp    = {Mon, 19 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/shti/Bleumer96b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/CallensN96a,
  author       = {Stefaan Callens and
                  Herman Nys},
  title        = {Health Informatics Deontology Code},
  booktitle    = {Data Security for Health Care - Volume {I:} Management Guidelines},
  series       = {Studies in Health Technology and Informatics},
  volume       = {31},
  pages        = {27--42},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-875-5-27},
  doi          = {10.3233/978-1-60750-875-5-27},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/shti/CallensN96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/DaveyK96,
  author       = {John Davey and
                  Stephen King},
  title        = {Guidelines on {IT} Security Risk Analysis For Health Care Management},
  booktitle    = {Data Security for Health Care - Volume {I:} Management Guidelines},
  series       = {Studies in Health Technology and Informatics},
  volume       = {31},
  pages        = {43--56},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-875-5-43},
  doi          = {10.3233/978-1-60750-875-5-43},
  timestamp    = {Mon, 19 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/shti/DaveyK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/DorpD96,
  author       = {Henk van Dorp and
                  J. Dubbeldam},
  title        = {Guidelines for Secure Systems Procurement, Development and Design
                  for Health Care Management},
  booktitle    = {Data Security for Health Care - Volume {I:} Management Guidelines},
  series       = {Studies in Health Technology and Informatics},
  volume       = {31},
  pages        = {185--206},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-875-5-185},
  doi          = {10.3233/978-1-60750-875-5-185},
  timestamp    = {Mon, 19 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/shti/DorpD96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/Flikkenschild96,
  author       = {Erik Flikkenschild},
  title        = {Getting started with the {SEISMED} Guidelines},
  booktitle    = {Data Security for Health Care - Volume {I:} Management Guidelines},
  series       = {Studies in Health Technology and Informatics},
  volume       = {31},
  pages        = {11--15},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-875-5-11},
  doi          = {10.3233/978-1-60750-875-5-11},
  timestamp    = {Mon, 19 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/shti/Flikkenschild96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/KatsikasG96,
  author       = {Sokratis K. Katsikas and
                  Dimitris Gritzalis},
  title        = {High Level Security Policy Guidelines},
  booktitle    = {Data Security for Health Care - Volume {I:} Management Guidelines},
  series       = {Studies in Health Technology and Informatics},
  volume       = {31},
  pages        = {57--81},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-875-5-57},
  doi          = {10.3233/978-1-60750-875-5-57},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/shti/KatsikasG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/Pangalos96,
  author       = {George Pangalos},
  title        = {Security of Medical Database Systems for Health Care Management},
  booktitle    = {Data Security for Health Care - Volume {I:} Management Guidelines},
  series       = {Studies in Health Technology and Informatics},
  volume       = {31},
  pages        = {108--134},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-875-5-108},
  doi          = {10.3233/978-1-60750-875-5-108},
  timestamp    = {Mon, 19 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/shti/Pangalos96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/PatelKCM96,
  author       = {Ahmed Patel and
                  Ioanna Kantzavelou and
                  Ciaran Clissman and
                  Dimitris Maroulis},
  title        = {Network Security Guidelines for Health Care Management},
  booktitle    = {Data Security for Health Care - Volume {I:} Management Guidelines},
  series       = {Studies in Health Technology and Informatics},
  volume       = {31},
  pages        = {135--184},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-875-5-135},
  doi          = {10.3233/978-1-60750-875-5-135},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/shti/PatelKCM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/SandersFW96,
  author       = {Peter W. Sanders and
                  Steven Furnell and
                  Matthew J. Warren},
  title        = {Baseline Security Guidelines for Health Care Management},
  booktitle    = {Data Security for Health Care - Volume {I:} Management Guidelines},
  series       = {Studies in Health Technology and Informatics},
  volume       = {31},
  pages        = {82--107},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-875-5-82},
  doi          = {10.3233/978-1-60750-875-5-82},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/shti/SandersFW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/shti/Veenen96,
  author       = {Gieeneke van Veenen},
  title        = {Guidelines for Secure System Implementation for Health Care Management},
  booktitle    = {Data Security for Health Care - Volume {I:} Management Guidelines},
  series       = {Studies in Health Technology and Informatics},
  volume       = {31},
  pages        = {207--226},
  publisher    = {{IOS} Press},
  year         = {1996},
  url          = {https://doi.org/10.3233/978-1-60750-875-5-207},
  doi          = {10.3233/978-1-60750-875-5-207},
  timestamp    = {Mon, 19 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/shti/Veenen96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}