Author of the publication

Policy Based Electronic Transmission of Prescriptions.

, and . POLICY, page 197-206. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. David Remy University of Stuttgart

Periodic Trajectories of Passive One-Legged Hopper, and . Dataset, (2024)Related to: M. Raff, N. Rosa and C. D. Remy, "Connecting Gaits in Energetically Conservative Legged Systems," in IEEE Robotics and Automation Letters, vol. 7, no. 3, pp. 8407-8414, July 2022,. doi: 10.1109/LRA.2022.3186500.
 

Other publications of authors with the same name

Electronic transmission of prescriptions: towards realising the dream., and . IJEH, 1 (1): 112-125 (2004)Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure., , and . Communications and Multimedia Security, volume 175 of IFIP, page 251-261. Springer, (2004)Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid., , , , , and . e-Science, page 22. IEEE Computer Society, (2006)Coordinated decision making in distributed applications.. Inf. Sec. Techn. Report, 12 (3): 147-154 (2007)Authorization Policy Federation in Heterogeneous Multicloud Environments., , and . IEEE Cloud Computing, 4 (4): 38-47 (2017)Experiences of using a PKI to access a hospital information system by high street opticians., , and . Computer Communications, 26 (16): 1893-1903 (2003)Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker., , , , , , and . Security and Communication Networks, (2017)Guest editorial: A brief overview of data leakage and insider threats., , , and . Information Systems Frontiers, 15 (1): 1-4 (2013)On the Modeling of Bell-LaPadula Security Policies Using RBAC., and . WETICE, page 257-262. IEEE Computer Society, (2008)Expressions of expertness: the virtuous circle of natural language for access control policy specification., , , and . SOUPS, page 77-88. ACM, (2008)