Sciweavers

18 search results - page 1 / 4
» Secure log management for privacy assurance in electronic co...
Sort
View
COMPSEC
2008
69views more  COMPSEC 2008»
13 years 4 months ago
Secure log management for privacy assurance in electronic communications
Vassilios Stathopoulos, Panayiotis Kotzanikolaou, ...
CCS
2009
ACM
14 years 5 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
CCS
2007
ACM
13 years 11 months ago
Towards a taxonomy for information security metrics
Systematic approaches to measuring security are needed in order to obtain evidence of the security performance of products or an organization. In this study we survey the emerging...
Reijo Savola
HIKM
2006
ACM
13 years 11 months ago
A flexible approach for electronic medical records exchange
Many methodologies have been proposed in the last decade for integration and exchange of medical data. However, little progress has occurred due to the following reasons. First, p...
Vagelis Hristidis, Peter J. Clarke, Nagarajan Prab...
I3E
2001
114views Business» more  I3E 2001»
13 years 6 months ago
Receipt-Freeness in Large-Scale Elections without Untappable Channels
: For an electronic election to be fully democratic there is a need for security mechanisms that will assure the privacy of the voters. With receipt-free electronic voting, a voter...
Emmanouil Magkos, Mike Burmester, Vassilios Chriss...