Sciweavers

3349 search results - page 55 / 670
» Data Security
Sort
View
ECEH
2006
144views Healthcare» more  ECEH 2006»
14 years 11 months ago
Process Based Data Logistics: Data Integration for Healthcare Applications
Data integration in medical applications is a crucial and sensitive task. It turns out that there are rigid factors like heterogeneous, distributed data sources, security, and comp...
Stefan Jablonski
ESOP
2003
Springer
15 years 3 months ago
On the Secure Implementation of Security Protocols
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the cont...
Pablo Giambiagi, Mads Dam
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 1 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
SAC
2011
ACM
14 years 20 days ago
Secure shared continuous query processing
Data stream management systems (DSMSs) process continuous queries over streaming data in real-time adhering to quality of service requirements. The data streams generated from sen...
Raman Adaikkalavan, Thomas Perez
CIKM
2008
Springer
14 years 12 months ago
Data degradation: making private data less sensitive over time
Trail disclosure is the leakage of privacy sensitive data, resulting from negligence, attack or abusive scrutinization or usage of personal digital trails. To prevent trail disclo...
Nicolas Anciaux, Luc Bouganim, Harold van Heerde, ...