Sciweavers

848 search results - page 72 / 170
» Secure Information Flow for Distributed Systems
Sort
View
IJMI
2006
73views more  IJMI 2006»
14 years 12 months ago
Six methodological steps to build medical data warehouses for research
In this paper we describe a methodology that emerged during a healthcare project, which consisted among others in grouping information from heterogeneous and distributed informati...
Nicolae B. Szirbik, C. Pelletier, Thierry J. Chaus...
COOPIS
2002
IEEE
15 years 4 months ago
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Konstantin Beznosov
EUROSYS
2008
ACM
15 years 9 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
HICSS
2005
IEEE
130views Biometrics» more  HICSS 2005»
15 years 5 months ago
Knowledge Flow in Interdisciplinary Teams
Knowledge flow in interdisciplinary teams has become of particular interest as research and alliances cross traditional disciplinary boundaries, and as computing is applied in any...
Caroline Haythornthwaite
BPM
2006
Springer
153views Business» more  BPM 2006»
15 years 3 months ago
Shop Floor Information Management and SOA
Service Science is a new term for a new paradigm which aims at the solution of an obvious problem: How to make the increasing fusion of business and IT successful in a dynamically ...
Konrad Pfadenhauer, Burkhard Kittl, Schahram Dustd...