Sciweavers

1398 search results - page 137 / 280
» Medical Database Security
Sort
View
ESORICS
2006
Springer
15 years 7 months ago
Private Information Retrieval Using Trusted Hardware
Abstract. Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impract...
Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
151
Voted
ACSW
2003
15 years 5 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
DBSEC
2000
110views Database» more  DBSEC 2000»
15 years 5 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
PERCOM
2005
ACM
16 years 3 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
ESANN
2008
15 years 5 months ago
Machine learning in cancer research: implications for personalised medicine
Driven by the growing demand of personalization of medical procedures, data-based, computer-aided cancer research in human patients is advancing at an accelerating pace, providing ...
Alfredo Vellido, Elia Biganzoli, Paulo J. G. Lisbo...