Sciweavers

579 search results - page 14 / 116
» Secure Access to Medical Data over the Internet
Sort
View
ICN
2005
Springer
15 years 3 months ago
Securing Layer 2 in Local Area Networks
Abstract. Network security problems have been well known and addressed in the application, transport, or network layers. However, the Data Link Layer (Layer 2) security has not bee...
Hayriye Altunbasak, Sven Krasser, Henry L. Owen, J...
72
Voted
HIKM
2006
ACM
15 years 3 months ago
A flexible approach for electronic medical records exchange
Many methodologies have been proposed in the last decade for integration and exchange of medical data. However, little progress has occurred due to the following reasons. First, p...
Vagelis Hristidis, Peter J. Clarke, Nagarajan Prab...
ICDS
2009
IEEE
15 years 4 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton
EUPROJECTS
2005
Springer
15 years 3 months ago
Participatory Insight to Universal Access: Methods and Validation Exercises
Participatory methods can, in principle, be applied for a variety of purposes to gain insight into the context of use of an artefact or the way in which tasks are performed by end ...
Michael Pieper, Karl Stroetmann
SAINT
2009
IEEE
15 years 4 months ago
Understanding the Challenges in Securing Internet Routing
The Internet routing system plays an essential role of glueing together tens of thousands of individual networks to create a global data delivery substrate. Over the years many ef...
Ricardo V. Oliveira, Mohit Lad, Lixia Zhang