Author of the publication

Standardized Exchange of Medical Data between a Research Database, an Electronic Patient Record and an Electronic Health Record using CDA/SCIPHOX.

, , , and . AMIA, AMIA, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Standardized Exchange of Medical Data between a Research Database, an Electronic Patient Record and an Electronic Health Record using CDA/SCIPHOX., , , and . AMIA, AMIA, (2005)Integration in der medizinischen Anwendung: Prozessbasierte Datenlogistik., , , and . EAI, volume 93 of CEUR Workshop Proceedings, CEUR-WS.org, (2004)Process Oriented Knowledge Management to Support Clinical Pathway Execution., , , and . Wissensmanagement, page 305-308. DFKI, Kaiserslautern, (2005)Building a Generic Platform for Medical Screening Applications Based on Domain Specific Modeling and Process Orientation., , , , , , and . DILS, volume 3615 of Lecture Notes in Computer Science, page 257-265. Springer, (2005)Configurable Execution Environments for Medical Processes., , , , , and . BPM Demos, volume 203 of CEUR Workshop Proceedings, CEUR-WS.org, (2006)Modellbasierte IT-Unterstützung von wissensintensiven Prozessen: dargestellt am Beispiel medizinischer Forschungsprozesse.. University of Erlangen-Nuremberg, (2007)Data-centric security with attribute-based encryption.. Darmstadt University of Technology, Germany, (2011)Evaluating the Biometric Sample Quality of Handwritten Signatures., and . ICB, volume 4642 of Lecture Notes in Computer Science, page 407-414. Springer, (2007)Process Based Data Logistics: a Solution for Clinical Integration Problems., , , and . DILS, volume 2994 of Lecture Notes in Computer Science, page 31-46. Springer, (2004)Hiding the Policy in Cryptographic Access Control., and . STM, volume 7170 of Lecture Notes in Computer Science, page 90-105. Springer, (2011)