Sciweavers

826 search results - page 5 / 166
» Medical Requirements for Data Protection
Sort
View
CLEF
2007
Springer
15 years 3 months ago
Overview of the ImageCLEFmed 2007 Medical Retrieval and Medical Annotation Tasks
This paper describes the medical image retrieval and medical image annotation tasks of ImageCLEF 2007. Separate sections describe each of the two tasks, with the participation and ...
Henning Müller, Thomas Deselaers, Thomas Mart...
71
Voted
AUSDM
2008
Springer
188views Data Mining» more  AUSDM 2008»
14 years 11 months ago
Priority Driven K-Anonymisation for Privacy Protection
Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. ...
Xiaoxun Sun, Hua Wang, Jiuyong Li
MOBISYS
2007
ACM
15 years 9 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
IEEECIT
2006
IEEE
15 years 3 months ago
Towards Balancing Data Usefulness and Privacy Protection in K-Anonymisation
K-anonymisation, as an approach to protecting data privacy, has received much recent attention from the database research community. Given a single table, there can be many ways t...
Grigorios Loukides, Jianhua Shao
DASFAA
2007
IEEE
163views Database» more  DASFAA 2007»
15 years 3 months ago
Protecting Individual Information Against Inference Attacks in Data Publishing
In many data-publishing applications, the data owner needs to protect sensitive information pertaining to individuals. Meanwhile, certain information is required to be published. T...
Chen Li, Houtan Shirani-Mehr, Xiaochun Yang