Sciweavers

1587 search results - page 202 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
15 years 4 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll
OOPSLA
2007
Springer
15 years 4 months ago
No ifs, ands, or buts: uncovering the simplicity of conditionals
Schematic tables are a new representation for conditionals. Roughly a cross between decision tables and data flow graphs, they represent computation and decision-making orthogona...
Jonathan Edwards
EUC
2005
Springer
15 years 3 months ago
A Hierarchical Anonymous Communication Protocol for Sensor Networks
Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to ...
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Le...
OOPSLA
2005
Springer
15 years 3 months ago
Language constructs for improving reusability in object-oriented software
The objective of this research project is to improve the reusability of object-oriented software. We have introduced anchored exception declarations to allow checked exceptions to...
Marko van Dooren, Eric Steegmans
APVIS
2008
14 years 11 months ago
MobiVis: A Visualization System for Exploring Mobile Data
The widespread use of mobile devices brings opportunities to capture large-scale, continuous information about human behavior. Mobile data has tremendous value, leading to busines...
Zeqian Shen, Kwan-Liu Ma