Sciweavers

1398 search results - page 132 / 280
» Medical Database Security
Sort
View
163
Voted
XMLSEC
2003
ACM
15 years 9 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
13 years 6 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
ESCIENCE
2007
IEEE
15 years 10 months ago
Cross-Middleware Interoperability in Distributed Concurrent Engineering
Secure, distributed collaboration between different organizations is a key challenge in Grid computing today. The GDCD project has produced a Grid-based demonstrator Virtual Colla...
E. Rowland Watkins, Mark McArdle, Thomas Leonard, ...
CCS
2010
ACM
15 years 8 months ago
Controlling data disclosure in computational PIR protocols
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server which is not fully trusted, without disclosing to the server the particular data e...
Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa B...
MICCAI
2008
Springer
16 years 5 months ago
A Bayesian Approach for Liver Analysis: Algorithm and Validation Study
Abstract. We present a new method for the simultaneous, nearly automatic segmentation of liver contours, vessels, and metastatic lesions from abdominal CTA scans. The method repeat...
Moti Freiman, Ofer Eliassaf, Yoav Taieb, Leo Jo...