Sign in

Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems.

Fatemeh RezaeibaghaYi Mu
Published in: TrustCom/BigDataSE/ICESS (2017)
Keyphrases
  • computer systems
  • security issues
  • security mechanisms
  • database
  • artificial intelligence
  • supply chain
  • low cost
  • distributed systems
  • access control
  • personal information
  • personal data