Login / Signup
Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems.
Fatemeh Rezaeibagha
Yi Mu
Published in:
TrustCom/BigDataSE/ICESS (2017)
Keyphrases
</>
computer systems
security issues
security mechanisms
database
artificial intelligence
supply chain
low cost
distributed systems
access control
personal information
personal data