Sciweavers

826 search results - page 13 / 166
» Medical Requirements for Data Protection
Sort
View
DASFAA
2009
IEEE
129views Database» more  DASFAA 2009»
15 years 4 months ago
Towards Preference-Constrained k-Anonymisation
Abstract. In this paper, we propose a novel preference-constrained approach to k-anonymisation. In contrast to the existing works on kanonymisation which attempt to satisfy a minim...
Grigorios Loukides, Achilles Tziatzios, Jianhua Sh...
BPM
2007
Springer
258views Business» more  BPM 2007»
15 years 1 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
HPCA
2008
IEEE
15 years 10 months ago
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors
Multiprocessor computer systems are currently widely used in commercial settings to run critical applications. These applications often operate on sensitive data such as customer ...
Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milo...
VIP
2001
14 years 11 months ago
Three-dimensional Medical Image Segmentation Using a Graph-Theoretic Energy-Minimisation Approach
A new graph algorithm for multiscale segmentation of threedimensional medical data sets is presented. It is a threedimensional generalisation of an existing two-dimensional Mumfor...
Brian Parker
MSS
1999
IEEE
85views Hardware» more  MSS 1999»
15 years 1 months ago
Tape Group Parity Protection
We propose a new method of ensuring the redundant storage of information on tertiary storage, especially tape storage. Conventional methods for redundant data storage on tape incl...
Theodore Johnson, Sunil Prabhakar