Sciweavers

1398 search results - page 167 / 280
» Medical Database Security
Sort
View
WPES
2004
ACM
15 years 9 months ago
Assessing global disclosure risk in masked microdata
In this paper, we introduce a general framework for microdata and three disclosure risk measures (minimal, maximal and weighted). We classify the attributes from a given microdata...
Traian Marius Truta, Farshad Fotouhi, Daniel C. Ba...
ACISP
2003
Springer
15 years 9 months ago
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
AGENTS
1997
Springer
15 years 8 months ago
Decision Making and Plan Management by Autonomous Agents: Theory, Implementation and Applications
A generic architecture for autonomous agents is presented. In commonwith other current proposals the agent is capable of reacting to and reasoning about events which occur in its ...
Subrata Kumar Das, John Fox, D. Elsdon, Peter Hamm...
CIKM
2008
Springer
15 years 6 months ago
Efficient techniques for document sanitization
Sanitization of a document involves removing sensitive information from the document, so that it may be distributed to a broader audience. Such sanitization is needed while declas...
Venkatesan T. Chakaravarthy, Himanshu Gupta, Prasa...
HIJ
2008
82views more  HIJ 2008»
15 years 4 months ago
Supporting grid-based clinical trials in Scotland
As clinical trials and medical population studies grow in size and complexity, a computational infrastructure that can underpin such studies is highly desirable. This should addre...
Richard O. Sinnott, A. J. Stell, Oluwafemi Ajayi