Author of the publication

Providing Secure Access to Confidential Patient Information Detailing Diabetic Condition.

, , , and . International Conference on Internet Computing (1), page 535-542. (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. David Remy University of Stuttgart

Periodic Trajectories of Passive One-Legged Hopper, and . Dataset, (2024)Related to: M. Raff, N. Rosa and C. D. Remy, "Connecting Gaits in Energetically Conservative Legged Systems," in IEEE Robotics and Automation Letters, vol. 7, no. 3, pp. 8407-8414, July 2022,. doi: 10.1109/LRA.2022.3186500.
 

Other publications of authors with the same name

Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure., , and . Communications and Multimedia Security, volume 175 of IFIP, page 251-261. Springer, (2004)Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid., , , , , and . e-Science, page 22. IEEE Computer Society, (2006)Authorization Policy Federation in Heterogeneous Multicloud Environments., , and . IEEE Cloud Computing, 4 (4): 38-47 (2017)Coordinated decision making in distributed applications.. Inf. Sec. Techn. Report, 12 (3): 147-154 (2007)Experiences of using a PKI to access a hospital information system by high street opticians., , and . Computer Communications, 26 (16): 1893-1903 (2003)Guest editorial: A brief overview of data leakage and insider threats., , , and . Information Systems Frontiers, 15 (1): 1-4 (2013)Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker., , , , , , and . Security and Communication Networks, (2017)Electronic transmission of prescriptions: towards realising the dream., and . IJEH, 1 (1): 112-125 (2004)On the Modeling of Bell-LaPadula Security Policies Using RBAC., and . WETICE, page 257-262. IEEE Computer Society, (2008)CardSpace in the cloud., , and . ACM Conference on Computer and Communications Security, page 657-659. ACM, (2010)