Sciweavers

635 search results - page 72 / 127
» Social Aspects of Information Security
Sort
View
ICISS
2005
Springer
15 years 5 months ago
Event Detection in Multilevel Secure Active Databases
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
Indrakshi Ray, Wei Huang
STACS
1992
Springer
15 years 3 months ago
Secure Commitment Against A Powerful Adversary
abstract Rafail Ostrovskyy Ramarathnam Venkatesanz Moti Yungx Secure commitment is a primitive enabling information hiding, which is one of the most basic tools in cryptography. S...
Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yun...
ESORICS
2009
Springer
15 years 6 months ago
Access Control in Location-Based Services
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of user...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
HICSS
2008
IEEE
155views Biometrics» more  HICSS 2008»
15 years 6 months ago
Pseudonymization for improving the Privacy in E-Health Applications
— Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. As hi...
Bernhard Riedl, Veronika Grascher, Stefan Fenz, Th...
CHI
2005
ACM
16 years 7 days ago
Imprints of place: creative expressions of the museum experience
Personalization and social awareness, important aspects in the definition of a place, are traditionally overlooked in the design of technology for museums. We describe Imprints, a...
Kirsten Boehner, Jennifer Thom-Santelli, Angela Zo...