Sciweavers

579 search results - page 75 / 116
» Secure Access to Medical Data over the Internet
Sort
View
COMPSAC
2009
IEEE
15 years 8 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
OOPSLA
1999
Springer
15 years 5 months ago
Removing Unnecessary Synchronization in Java
Java programs perform many synchronization operations on data structures. Some of these synchronizations are unnecessary; in particular, if an object is reachable only by a single ...
Jeff Bogda, Urs Hölzle
SIGMOD
2007
ACM
166views Database» more  SIGMOD 2007»
16 years 1 months ago
Threats to privacy in the forensic analysis of database systems
The use of any modern computer system leaves unintended traces of expired data and remnants of users' past activities. In this paper, we investigate the unintended persistenc...
Patrick Stahlberg, Gerome Miklau, Brian Neil Levin...
ICWS
2009
IEEE
15 years 10 months ago
Change Detection and Correction Facilitation for Web Applications and Services
There are a large number of websites serving valuable content that can be used by higher-level applications, Web Services, Mashups etc. Yet, due to various reasons (lack of comput...
Alfredo Alba, Varun Bhagwan, Tyrone Grandison, Dan...
IPPS
2005
IEEE
15 years 7 months ago
On the Impact of IPsec on Interactive Communications
Interactive communication services as telephony and video-conferences use the infrastructure of existing LANs and the Internet more and more. The advantages are obvious. For examp...
Jirka Klaue, Andreas Hess