Sciweavers

4264 search results - page 33 / 853
» Provenance-aware secure networks
Sort
View
HICSS
2011
IEEE
335views Biometrics» more  HICSS 2011»
14 years 1 months ago
Cyberinfrastructure for Secondary Use of EHR Data: SSA's Use of the Nationwide Health Information Network
This study examined the use of the Nationwide Health Information Network as a cyberinfrastructure for secure and interoperable transport of existing clinical data from electronic ...
Sue S. Feldman, Thomas A. Horan
ISSE
2006
14 years 9 months ago
Security Analysis and Configuration of Large Networks
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Antonio Lioy
79
Voted
ICIP
2010
IEEE
14 years 7 months ago
Security analysis for privacy preserving search of multimedia
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
Wenjun Lu, Avinash L. Varna, Min Wu
IFIP
2010
Springer
14 years 4 months ago
Modular Plans for Secure Service Composition
Service Oriented Computing (SOC) is a programming paradigm aiming at characterising Service Networks. Services are entities waiting for clients requests and they often result from ...
Gabriele Costa, Pierpaolo Degano, Fabio Martinelli
PAISI
2007
Springer
15 years 3 months ago
Security Assessment for Application Network Services Using Fault Injection
Vulnerabilities in network protocol software have been problematic since Internet infrastructure was deployed. These vulnerabilities damage the reliability of network software and ...
Hyungwoo Kang, Dong Hoon Lee