Sciweavers

1456 search results - page 26 / 292
» Keeping encountered information
Sort
View
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 4 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
72
Voted
CSFW
2004
IEEE
15 years 2 months ago
Lenient Array Operations for Practical Secure Information Flow
Our goal in this paper is to make secure information flow typing more practical. We propose simple and permissive typing rules for array operations in a simple sequential imperati...
Zhenyue Deng, Geoffrey Smith
103
Voted
BCSHCI
2007
14 years 11 months ago
Breaking the campus bubble: informed, engaged, connected
This paper introduces UniVote, a system supporting mobile phone-based interaction with public displays. The case study carried out at Lancaster University indicates that the campu...
Nick Day, Corina Sas, Alan J. Dix, Motoko Toma, Ch...
NCA
2009
IEEE
15 years 5 months ago
Sharing Private Information Across Distributed Databases
—In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organ...
Michael Siegenthaler, Ken Birman
82
Voted
GI
2004
Springer
15 years 3 months ago
Dynamic information fusion for genome annotation
: The need for demand-driven and scaleable integration of heterogeneous data sources is inherent to the process of genome annotation. In this paper we describe the Gene-EYe archite...
Heiko Müller, Peter Rieger, Katja Tham, Johan...