Sciweavers

826 search results - page 24 / 166
» Medical Requirements for Data Protection
Sort
View
POS
1994
Springer
15 years 1 months ago
Protection in Grasshopper: A Persistent Operating System
nt systems support a single storage abstraction in which all data may be created and manipulated in a uniform manner, regardless of its longevity. In such systems a protection mec...
Alan Dearle, Rex di Bona, James Farrow, Frans A. H...
ISSA
2008
14 years 11 months ago
The IP Protection of Electronic Databases: Copyright or Copywrong?
The protection of the intellectual investments embodied in databases is of the utmost importance. Technological innovation has rendered databases vulnerable to unauthorised access...
Tana Pistorius
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
VISUALIZATION
2000
IEEE
15 years 2 months ago
Combining local and remote visualization techniques for interactive volume rendering in medical applications
For a comprehensive understanding of tomographic image data in medical routine, interactive and high–quality direct volume rendering is an essential prerequisite. This is provid...
Klaus Engel, Thomas Ertl, Peter Hastreiter, Bernd ...
IFIP12
2008
14 years 11 months ago
Addressing Risk Assessment for Patient Safety in Hospitals through Information Extraction in Medical Reports
: Hospital Acquired Infections (HAI) is a real burden for doctors and risk surveillance experts. The impact on patients' health and related healthcare cost is very significant...
Denys Proux, Frédérique Segond, Solw...