Sciweavers

89 search results - page 17 / 18
» The Role of Cryptography in Database Security
Sort
View
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
13 years 11 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
BPM
2007
Springer
258views Business» more  BPM 2007»
13 years 9 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
VLDB
2001
ACM
96views Database» more  VLDB 2001»
13 years 9 months ago
Architectures for Internal Web Services Deployment
There is a new emerging world of web services. In this world, services will be combined in innovative ways to form elaborate services out of building blocks of other services. Thi...
Oded Shmueli
MEDIAFORENSICS
2010
13 years 6 months ago
Efficient estimation of CFA pattern configuration in digital camera images
This paper proposes an efficient method to determine the concrete configuration of the color filter array (CFA) from demosaiced images. This is useful to decrease the degrees of f...
Matthias Kirchner
ISSA
2004
13 years 6 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo