Now showing items 1-2 of 2

    • Security Boundaries 

      FARRELL, STEPHEN (2008)
      Security boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data crosses each boundary. ...
    • Sharing health-care records over the Internet 

      GRIMSON, JANE BARCLAY (IEEE, 2001)
      Presents a novel approach to sharing electronic health-care records that leverages the Internet and the World Wide Web, developed as part of two European Commission-funded projects, Synapses and SynEx. The approach provides ...