Sciweavers

318 search results - page 63 / 64
» Policy Based Management for Critical Infrastructure Protecti...
Sort
View
WPES
2003
ACM
13 years 10 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
MOBISYS
2007
ACM
14 years 4 months ago
A time-and-value centric provenance model and architecture for medical event streams
Provenance becomes a critical requirement for healthcare IT infrastructures, especially when pervasive biomedical sensors act as a source of raw medical streams for large-scale, a...
Min Wang, Marion Blount, John Davis, Archan Misra,...
MM
2005
ACM
167views Multimedia» more  MM 2005»
13 years 11 months ago
Evaluation axes for medical image retrieval systems: the imageCLEF experience
Content–based image retrieval in the medical domain is an extremely hot topic in medical imaging as it promises to help better managing the large amount of medical images being ...
Henning Müller, Paul Clough, William R. Hersh...
VLDB
2004
ACM
118views Database» more  VLDB 2004»
13 years 10 months ago
On the performance of bitmap indices for high cardinality attributes
It is well established that bitmap indices are efficient for read-only attributes with low attribute cardinalities. For an attribute with a high cardinality, the size of the bitma...
Kesheng Wu, Ekow J. Otoo, Arie Shoshani
INFOCOM
2010
IEEE
13 years 3 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou