Sciweavers

9 search results - page 1 / 2
» dbsec 2009
Sort
View
DBSEC
2009
94views Database» more  DBSEC 2009»
13 years 2 months ago
Privacy-Preserving Telemonitoring for eHealth
Mohamed Layouni, Kristof Verslype, Mehmet Tahir Sa...
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 5 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 5 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
DBSEC
2009
112views Database» more  DBSEC 2009»
13 years 5 months ago
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers
There is an increasing need for sharing data repositories containing personal information across multiple distributed and private databases. However, such data sharing is subject t...
Pawel Jurczyk, Li Xiong