Sciweavers

119 search results - page 2 / 24
» Self Protecting Data for De-perimeterised Information Sharin...
Sort
View
MEDINFO
2007
122views Healthcare» more  MEDINFO 2007»
13 years 6 months ago
Protecting Privacy while Sharing Medical Data Between Regional Healthcare Entities
Economies of scale, corporate partnerships and a need to increase the efficiency of Information Technology in the Healthcare sector are leading to the construction of Regional Hea...
Tyrone Grandison, Srivatsava Ranjit Ganta, Uri Bra...
DSS
2007
226views more  DSS 2007»
13 years 4 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
TCAD
2008
88views more  TCAD 2008»
13 years 4 months ago
Self-Adaptive Data Caches for Soft-Error Reliability
Soft-error induced reliability problems have become a major challenge in designing new generation microprocessors. Due to the on-chip caches' dominant share in die area and tr...
Shuai Wang, Jie S. Hu, Sotirios G. Ziavras
ITSSA
2006
132views more  ITSSA 2006»
13 years 4 months ago
A Self-Governance Approach to Supporting Privacy Preference-based Content Sharing
: The increase in the creation and sharing of distributed multimedia content has led to the creation of new tools and methods to automatically and manually annotate content to assi...
Patricia Charlton, Jonathan Teh
FC
2005
Springer
87views Cryptology» more  FC 2005»
13 years 10 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton