• Aucun résultat trouvé

Documents médicaux

N/A
N/A
Protected

Academic year: 2022

Partager "Documents médicaux"

Copied!
2
0
0

Texte intégral

(1)

Documents médicaux

Sommaire Volume 12 – n° 3/2009

7 Editorial – C. Verdier, A. Flory

9 Documents électroniques et soins de santé Electronic documents and health care F.MENNERAT

23 Gestion décentralisée des documents médicaux des patients.

Un système de recherche et d’accès aux données

Decentralised management of medical records. A research and access system

C.QUANTIN,G.COATRIEUX,M.FASSA,V.BRETON,P. DE VLIEGER, K.BOURQUARD,N.LIPSZYC,J.-Y.BOIRE,C.ROUX,F.-A.ALLAERT

37 Présentation et visualisation des documents médicaux.

Le dossier médical numérique

Medical documents representation and visualization.

Electronic medical documents S.SASSI,C.VERDIER

59 La mise en œuvre d’un modèle de contrôle d’accès adapté

aux systèmes pervasifs. Application aux équipes mobiles gériatriques Implementing an adaptive access control model for pervasive systems.

Case study on mobile geriatrics teams D.AL KUKHUN,F.SÈDES

79 Carnet de l’interne augmenté pour l’apprentissage pervasif pendant l’activité de soins

An augmented notebook for the residents for pervasive learning during care

N.BRICON-SOUF,N.LEROY,J.-M.RENARD,R.MESSAI

Cet article des Editions Lavoisier est disponible en acces libre et gratuit sur dn.revuesonline.com

(2)

Cet article des Editions Lavoisier est disponible en acces libre et gratuit sur dn.revuesonline.com

Références

Documents relatifs

We introduce the Social Semantic SPARQL Security for Access Control vo- cabulary (S4AC), a lightweight ontology which allows the information providers to specify fine-grained

Many solutions have been proposed in order to secure the access to multimedia data- bases and systems. While some authors were interested in the security of the connec- tion to

With considerable discrepancies in reported effects of posture on energy expenditure, 2,3,5 the present study sought to elucidate whether REE measured under standardized conditions in

To the best of our knowledge, the first proof of uniform global asymptotic stability in the adaptive case (hence, including uniform convergence of the parameter estimation errors)

These three situations demonstrate the limits of existing access control models and advocate the integration of explicit authorizations on ancestor and sibling relationships in

Our findings indicate that: (i) integrating storage capabilities to HAPs sub- stantially increases connectivity opportunities for mobile nodes, (ii) service qual- ity for mobile

Specifically, we equip PAPs with the Contextual Behaviour Learning component, which is responsible to build user profiles according to the monitored behavior and refine access

A second direction is to optimize the authorization checking algorithm sketched in Section 5, using techniques such as: pre-computation and caching, which are discussed for RPPM in