Sciweavers

579 search results - page 26 / 116
» Secure Access to Medical Data over the Internet
Sort
View
CSSE
2004
IEEE
15 years 1 months ago
A comparison of modeling strategies in defining XML-based access control languages
One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats....
Claudio Agostino Ardagna, Sabrina De Capitani di V...
CCR
2006
76views more  CCR 2006»
15 years 1 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 8 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
CLEF
2008
Springer
15 years 3 months ago
Overview of the ImageCLEFmed 2008 Medical Image Retrieval Task
2008 was the fifth year for the medical image retrieval task of ImageCLEF, one of the most popular tracks within CLEF. Participation continued to increase in 2008. A total of 15 g...
Henning Müller, Jayashree Kalpathy-Cramer, Ch...
IADIS
2003
15 years 2 months ago
Improving Internet Research Methods: A Web Laboratory
We describe the current state of a resource that enables research in the human sciences with differential access rights for experimenters and participants in experiments. We outli...
Maria Buckley, Carl Vogel