Sciweavers

826 search results - page 27 / 166
» Medical Requirements for Data Protection
Sort
View
CCS
2009
ACM
15 years 4 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning
68
Voted
ECAI
2008
Springer
14 years 11 months ago
Addressing Temporal Aspects of Privacy-Related Norms
Abstract. Agents interacting in open environments such as Internet are often in charge of personal information. In order to protect the privacy of human users, such agents have to ...
Guillaume Piolle, Yves Demazeau
MICCAI
2006
Springer
15 years 10 months ago
An Energy Minimization Approach to the Data Driven Editing of Presegmented Images/Volumes
Fully automatic, completely reliable segmentation in medical images is an unrealistic expectation with today's technology. However, many automatic segmentation algorithms may ...
Leo Grady, Gareth Funka-Lea
ESORICS
2005
Springer
15 years 3 months ago
On Obligations
Access control is concerned with granting access to sensitive data based on conditions that relate to the past or present, so-called provisions. Expressing requirements from the do...
Manuel Hilty, David A. Basin, Alexander Pretschner
TMC
2008
159views more  TMC 2008»
14 years 8 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu