Sciweavers

71 search results - page 5 / 15
» Data protection in outsourcing scenarios: issues and directi...
Sort
View
93
Voted
ESORICS
2006
Springer
15 years 3 months ago
Policy-Driven Memory Protection for Reconfigurable Hardware
Abstract. While processor based systems often enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable har...
Ted Huffmire, Shreyas Prasad, Timothy Sherwood, Ry...
IHI
2012
353views Healthcare» more  IHI 2012»
13 years 7 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad
VLDB
2004
ACM
100views Database» more  VLDB 2004»
15 years 5 months ago
Resilient Rights Protection for Sensor Streams
Today’s world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis,...
Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
75
Voted
DEBU
2002
100views more  DEBU 2002»
14 years 11 months ago
Indexing the Trajectories of Moving Objects
The domain of spatiotemporal applications is a treasure trove of new types of data and queries. In this work, the focus is on a spatiotemporal sub-domain, namely the trajectories ...
Dieter Pfoser
82
Voted
SP
2009
IEEE
15 years 6 months ago
Privacy Weaknesses in Biometric Sketches
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order to alleviate such concerns: rather than comparing...
Koen Simoens, Pim Tuyls, Bart Preneel