Research Article

EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining

Figure 8

Transformation policies into access tables.