default search action
Search dblp for Publications
export results for "toc:db/series/shti/shti31.bht:"
@book{DBLP:series/shti/31, title = {Data Security for Health Care - Volume {I:} Management Guidelines}, series = {Studies in Health Technology and Informatics}, volume = {31}, publisher = {{IOS} Press}, year = {1996}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=23322}, isbn = {978-90-5199-264-9}, timestamp = {Mon, 19 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/shti/31.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/Bleumer96a, author = {Gerrit Bleumer}, title = {Introduction to the {SEISMED} Guidelines}, booktitle = {Data Security for Health Care - Volume {I:} Management Guidelines}, series = {Studies in Health Technology and Informatics}, volume = {31}, pages = {1--10}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-875-5-1}, doi = {10.3233/978-1-60750-875-5-1}, timestamp = {Mon, 19 Mar 2018 07:49:39 +0100}, biburl = {https://dblp.org/rec/series/shti/Bleumer96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/Bleumer96b, author = {Gerrit Bleumer}, title = {Annex: Guideline for Cryptographic Mechanisms for Health Care Management}, booktitle = {Data Security for Health Care - Volume {I:} Management Guidelines}, series = {Studies in Health Technology and Informatics}, volume = {31}, pages = {227--234}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-875-5-227}, doi = {10.3233/978-1-60750-875-5-227}, timestamp = {Mon, 19 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/shti/Bleumer96b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/CallensN96a, author = {Stefaan Callens and Herman Nys}, title = {Health Informatics Deontology Code}, booktitle = {Data Security for Health Care - Volume {I:} Management Guidelines}, series = {Studies in Health Technology and Informatics}, volume = {31}, pages = {27--42}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-875-5-27}, doi = {10.3233/978-1-60750-875-5-27}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/shti/CallensN96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/DaveyK96, author = {John Davey and Stephen King}, title = {Guidelines on {IT} Security Risk Analysis For Health Care Management}, booktitle = {Data Security for Health Care - Volume {I:} Management Guidelines}, series = {Studies in Health Technology and Informatics}, volume = {31}, pages = {43--56}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-875-5-43}, doi = {10.3233/978-1-60750-875-5-43}, timestamp = {Mon, 19 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/shti/DaveyK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/DorpD96, author = {Henk van Dorp and J. Dubbeldam}, title = {Guidelines for Secure Systems Procurement, Development and Design for Health Care Management}, booktitle = {Data Security for Health Care - Volume {I:} Management Guidelines}, series = {Studies in Health Technology and Informatics}, volume = {31}, pages = {185--206}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-875-5-185}, doi = {10.3233/978-1-60750-875-5-185}, timestamp = {Mon, 19 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/shti/DorpD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/Flikkenschild96, author = {Erik Flikkenschild}, title = {Getting started with the {SEISMED} Guidelines}, booktitle = {Data Security for Health Care - Volume {I:} Management Guidelines}, series = {Studies in Health Technology and Informatics}, volume = {31}, pages = {11--15}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-875-5-11}, doi = {10.3233/978-1-60750-875-5-11}, timestamp = {Mon, 19 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/shti/Flikkenschild96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/KatsikasG96, author = {Sokratis K. Katsikas and Dimitris Gritzalis}, title = {High Level Security Policy Guidelines}, booktitle = {Data Security for Health Care - Volume {I:} Management Guidelines}, series = {Studies in Health Technology and Informatics}, volume = {31}, pages = {57--81}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-875-5-57}, doi = {10.3233/978-1-60750-875-5-57}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/shti/KatsikasG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/Pangalos96, author = {George Pangalos}, title = {Security of Medical Database Systems for Health Care Management}, booktitle = {Data Security for Health Care - Volume {I:} Management Guidelines}, series = {Studies in Health Technology and Informatics}, volume = {31}, pages = {108--134}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-875-5-108}, doi = {10.3233/978-1-60750-875-5-108}, timestamp = {Mon, 19 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/shti/Pangalos96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/PatelKCM96, author = {Ahmed Patel and Ioanna Kantzavelou and Ciaran Clissman and Dimitris Maroulis}, title = {Network Security Guidelines for Health Care Management}, booktitle = {Data Security for Health Care - Volume {I:} Management Guidelines}, series = {Studies in Health Technology and Informatics}, volume = {31}, pages = {135--184}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-875-5-135}, doi = {10.3233/978-1-60750-875-5-135}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/shti/PatelKCM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/SandersFW96, author = {Peter W. Sanders and Steven Furnell and Matthew J. Warren}, title = {Baseline Security Guidelines for Health Care Management}, booktitle = {Data Security for Health Care - Volume {I:} Management Guidelines}, series = {Studies in Health Technology and Informatics}, volume = {31}, pages = {82--107}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-875-5-82}, doi = {10.3233/978-1-60750-875-5-82}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/shti/SandersFW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/shti/Veenen96, author = {Gieeneke van Veenen}, title = {Guidelines for Secure System Implementation for Health Care Management}, booktitle = {Data Security for Health Care - Volume {I:} Management Guidelines}, series = {Studies in Health Technology and Informatics}, volume = {31}, pages = {207--226}, publisher = {{IOS} Press}, year = {1996}, url = {https://doi.org/10.3233/978-1-60750-875-5-207}, doi = {10.3233/978-1-60750-875-5-207}, timestamp = {Mon, 19 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/shti/Veenen96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.