Sciweavers

2 search results - page 1 / 1
» Equivalence-based Security for Querying Encrypted Databases:...
Sort
View
CCS
2011
ACM
12 years 4 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
IJMI
2007
140views more  IJMI 2007»
13 years 4 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson