Login / Signup
Extended provisioning, security and analysis techniques for the ECHO health data management system.
Frank Steimle
Matthias Wieland
Bernhard Mitschang
Sebastian Wagner
Frank Leymann
Published in:
Computing (2017)
Keyphrases
</>
statistical analysis
forensic analysis
database
data sets
databases
search engine
website
access control
cloud computing
anomaly detection
intrusion detection
high frequency
information security
quantitative analysis
resource management
risk analysis