Sciweavers

579 search results - page 27 / 116
» Secure Access to Medical Data over the Internet
Sort
View
WWW
2007
ACM
16 years 2 months ago
Subspace: secure cross-domain communication for web mashups
Combining data and code from third-party sources has enabled a new wave of web mashups that add creativity and functionality to web applications. However, browsers are poorly desi...
Collin Jackson, Helen J. Wang
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
15 years 5 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
191
Voted
VLDB
2007
ACM
187views Database» more  VLDB 2007»
16 years 1 months ago
Secure Data Outsourcing
The networked and increasingly ubiquitous nature of today's data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly...
Radu Sion
APCHI
2004
IEEE
15 years 5 months ago
Real-World Oriented Access Control Method with a Displayed Password
Abstract. Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered u...
Yuji Ayatsuka, Michimune Kohno, Jun Rekimoto
GLOBECOM
2010
IEEE
14 years 11 months ago
On the Use of Concurrent Multipath Transfer over Asymmetric Paths
Abstract--With the deployment of more and more resiliencecritical Internet applications, there is a rising demand for multihomed network sites. This leads to the desire for simulta...
Thomas Dreibholz, Martin Becke, Erwin P. Rathgeb, ...