Sciweavers

3452 search results - page 583 / 691
» Secure Data Outsourcing
Sort
View
90
Voted
JAMIA
2011
101views more  JAMIA 2011»
14 years 3 months ago
The military health system's personal health record pilot with Microsoft HealthVault and Google Health
Objective To design, build, implement, and evaluate a personal health record (PHR), tethered to the Military Health System, that leverages MicrosoftÒ HealthVault and GoogleÒ Hea...
Nhan V. Do, Rick Barnhill, Kimberly A. Heermann-Do...
132
Voted
PLDI
2011
ACM
14 years 3 months ago
Safe optimisations for shared-memory concurrent programs
Current proposals for concurrent shared-memory languages, including C++ and C, provide sequential consistency only for programs without data races (the DRF guarantee). While the i...
Jaroslav Sevcík
ACC
2011
65views more  ACC 2011»
14 years 22 days ago
Measuring the Deployment Hiccups of DNSSEC
On May 5, 2010 the last step of the DNSSEC deployment on the 13 root servers was completed. DNSSEC is a set of security extensions on the traditional DNS protocol, that aim in prev...
Vasilis Pappas, Angelos D. Keromytis
ICB
2009
Springer
184views Biometrics» more  ICB 2009»
15 years 7 months ago
Challenges and Research Directions for Adaptive Biometric Recognition Systems
Biometric authentication using mobile devices is becoming a convenient and important means to secure access to remote services such as telebanking and electronic transactions. Such...
Norman Poh, Rita Wong, Josef Kittler, Fabio Roli
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 29 days ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...