Sciweavers

1398 search results - page 122 / 280
» Medical Database Security
Sort
View
CBMS
2002
IEEE
15 years 9 months ago
An Intelligent Agent-based Knowledge Broker for Enterprise-wide Healthcare Knowledge Procurement
Within the confines of a Healthcare Enterprise Memory (HEM), most traditional medical systems do not sufficiently provide the necessary assistance to healthcare practitioners in t...
Zafar Iqbal Hashmi, Syed Sibte Raza Abidi, Yu-N Ch...
182
Voted
SSWMC
2004
15 years 5 months ago
Attacks on biometric systems: a case study in fingerprints
In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks t...
Umut Uludag, Anil K. Jain
154
Voted
EDBT
2010
ACM
181views Database» more  EDBT 2010»
15 years 2 months ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...
ICASSP
2009
IEEE
15 years 10 months ago
Secure image retrieval through feature protection
This paper addresses the problem of image retrieval from an encrypted database, where data confidentiality is preserved both in the storage and retrieval process. The paper focus...
Wenjun Lu, Avinash L. Varna, Ashwin Swaminathan, M...
HICSS
2002
IEEE
152views Biometrics» more  HICSS 2002»
15 years 9 months ago
Security Considerations for Distributed Web-Based E-commerce Applications in Java
Today’s distributed e-commerce applications typically rely upon various technologies in their realization, including the web, scripting languages, server-side processing and an ...
Timothy E. Lindquist