Login / Signup
Security Architecture for HL/7 Message Interchange.
T. S. Chen
B. S. Liao
M. G. Lin
T. G. Gough
Published in:
MedInfo (2001)
Keyphrases
</>
security architecture
access control
security model
security policies
data integrity
security mechanisms
email
simulation platform
intrusion detection system
multi agent
intrusion detection
data protection
insider threat