Sciweavers

2001 search results - page 91 / 401
» A security architecture for data privacy and security
Sort
View
TDP
2010
88views more  TDP 2010»
14 years 6 months ago
P-Sensitive K-Anonymity with Generalization Constraints
Numerous privacy models based on the kanonymity property and extending the kanonymity model have been introduced in the last few years in data privacy re search: ldiversity, psen...
Alina Campan, Traian Marius Truta, Nicholas Cooper
CSREASAM
2008
15 years 1 months ago
Design of an Automatic Password Protection Mechanism for Digital Documents
- Maintaining digital security and privacy are critical issues in the modern workplace. Sensitive and proprietary data is frequently transmitted electronically, and with the large ...
Shashank Kaushik, Thomas Way
OOPSLA
1998
Springer
15 years 4 months ago
Data Groups: Specifying the Modification of Extended State
This paper explores the interpretation of specifications in the context of an object-oriented programming language with subclassing and method overrides. In particular, the paper ...
K. Rustan M. Leino
DEXAW
2004
IEEE
98views Database» more  DEXAW 2004»
15 years 3 months ago
MetaData for Efficient, Secure and Extensible Access to Data in a Medical Grid
In this paper we present the metadata usage in a medical imaging project grid. Metadata represent data about the data: In our case, the data are medical images and the metadata sto...
Jean-Marc Pierson, Ludwig Seitz, Hector Duque, Joh...
TRUSTBUS
2005
Springer
15 years 5 months ago
A Multilateral Secure Payment System for Wireless LAN Hotspots
Beginning with the adoption of the de-facto standard for wireless LAN communications IEEE 802.11 in 1999 we can observe a continuous growth of public wireless LAN hotspots that pro...
Stephan Groß, Sabine Lein, Sandra Steinbrech...