1 |
Technical Report CMR/ SEI-95-Tr-021, 1995
|
2 |
David Gourley and Brian Totty, "HTTP: The Definitive Guide", O'Reilly Media, 2002.
|
3 |
http://www.owasp.org/index.php/ Cross-Site _Request_Forgery
|
4 |
http://www.owasp.org/index.php/CSRF_GuardOWASP,CSRFGuard,
|
5 |
Sichoon,Noh,"A Securing Method of Multispectral Protection Infrastructure for Malicious Traffic in Intrne System", DCS, 2006.02
|
6 |
R. H. Dolin, L. Alschuler, S. Boyer, C. Beebe,F. M. Behlen, et al(2005), "HL7 Clinical Document Architecture, release 2," J. Am. Med. Inform.Assoc., 13(1), 30-39
|
7 |
Bernd Blobe(2004), "Authorisation and access control for electronic health record systems", International Journal of Medical Informatics 73, 251-257.
DOI
ScienceOn
|
8 |
J.W. Choi, S.Y. Yoo, H.Y. Park, J.H. Chun(2005), "Design and Implementation of HL7-based Real-time Data Communication for Mobile Clinical Information System", J. Biomed. Eng.Res.Vol.26, No2,65-71.
|
9 |
IEEE Std. 1971 (Recommended Practice for Architectural Description of Software-Intensive Systems), 2000.10
|