Sciweavers

120 search results - page 6 / 24
» Securing the e-health cloud
Sort
View
ATAL
2004
Springer
15 years 5 months ago
Adaptive Information Infrastructures for the e-Society
Abstract. Positioned at the confluence between human/machine and hardware/software integration and backed by a solid proof of concept realized through several scenarios encompassin...
Mihaela Ulieru
CCS
2010
ACM
15 years 6 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
HICSS
2008
IEEE
155views Biometrics» more  HICSS 2008»
15 years 6 months ago
Pseudonymization for improving the Privacy in E-Health Applications
— Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. As hi...
Bernhard Riedl, Veronika Grascher, Stefan Fenz, Th...
HOTOS
2009
IEEE
15 years 3 months ago
Computer Meteorology: Monitoring Compute Clouds
Cloud computing environments allow customers to execute arbitrary code on hardware owned by a cloud provider. While cloud providers use virtualization to ensure isolation between ...
Lionel Litty, H. Andrés Lagar-Cavilla, Davi...
CSREASAM
2010
14 years 6 months ago
Security Challenges in Cloud Computing
Levent Ertaul, S. Singhal, Gökay Saldamli