Sciweavers

1398 search results - page 49 / 280
» Medical Database Security
Sort
View
105
Voted
CBMS
2006
IEEE
15 years 4 months ago
Automatic Extraction of Bibliographic Information from Biomedical Online Journal Articles Using a String Matching Algorithm
A system has been developed to extract bibliographic data (grant numbers and databank accession numbers) from online biomedical journal articles for the National Library of Medici...
Jongwoo Kim, Daniel X. Le, George R. Thoma
90
Voted
ICEIS
2002
IEEE
15 years 5 months ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
108
Voted
SIGIR
2006
ACM
15 years 6 months ago
You are what you say: privacy risks of public mentions
In today’s data-rich networked world, people express many aspects of their lives online. It is common to segregate different aspects in different places: you might write opinion...
Dan Frankowski, Dan Cosley, Shilad Sen, Loren G. T...
90
Voted
BMCBI
2010
169views more  BMCBI 2010»
15 years 19 days ago
eCOMPAGT integrates mtDNA: import, validation and export of mitochondrial DNA profiles for population genetics, tumour dynamics
Background: Mitochondrial DNA (mtDNA) is widely being used for population genetics, forensic DNA fingerprinting and clinical disease association studies. The recent past has uncov...
Hansi Weißensteiner, Sebastian Schönher...
92
Voted
BNCOD
2006
85views Database» more  BNCOD 2006»
15 years 1 months ago
Trust Obstacle Mitigation for Database Systems
This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model...
Victor Page, Robin C. Laney, Maurice Dixon, Charle...