Sciweavers

15 search results - page 2 / 3
» Minimal information disclosure with efficiently verifiable c...
Sort
View
IJMI
2007
140views more  IJMI 2007»
13 years 5 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
PDIS
1994
IEEE
13 years 9 months ago
Exposing I/O Concurrency with Informed Prefetching
Informed prefetching provides a simple mechanism for I/O-intensive, cache-ineffective applications to efficiently exploit highly-parallel I/O subsystems such as disk arrays. This ...
R. Hugo Patterson, Garth A. Gibson
CCS
2008
ACM
13 years 7 months ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett
PERCOM
2004
ACM
14 years 4 months ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
USENIX
1994
13 years 6 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze