Sciweavers

579 search results - page 35 / 116
» Secure Access to Medical Data over the Internet
Sort
View
CCGRID
2005
IEEE
15 years 7 months ago
A grid-based HIV expert system
ABSTRACT. Objectives. This paper addresses Grid-based integration and access of distributed data from infectious disease patient databases, literature on in-vitro and in-vivo pharm...
Peter M. A. Sloot, Alexander Boukhanovsky, Wilco K...
SOUPS
2009
ACM
15 years 8 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
CCR
2010
128views more  CCR 2010»
14 years 11 months ago
The 2nd workshop on active internet measurements (AIMS-2) report
On February 8-10, 2010, CAIDA hosted the second Workshop on Active Internet Measurements (AIMS-2) as part of our series of Internet Statistics and Metrics Analysis (ISMA) workshop...
kc claffy, Emile Aben, Jordan Augé, Robert ...
ISI
2006
Springer
15 years 1 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
122
Voted
MDM
2007
Springer
111views Communications» more  MDM 2007»
15 years 7 months ago
FragDB - Secure Localized Storage Based on Super-Distributed RFID-Tag Infrastructures
Smart environments and wearables will make the storage and subsequent sharing of digitized multimedia diaries and meeting protocols – whom we meet, or what we say or do – chea...
Marc Langheinrich