Sciweavers

1779 search results - page 173 / 356
» A Formal Model of Data Privacy
Sort
View
JUCS
2006
102views more  JUCS 2006»
15 years 4 months ago
Modeling Inheritance as Coercion in the Kenzo System
Abstract: In this paper the analysis of the data structures used in a symbolic computation system, called Kenzo, is undertaken. We deal with the specification of the inheritance re...
César Domínguez, Julio Rubio, Franci...
TSC
2010
130views more  TSC 2010»
14 years 11 months ago
Secure Abstraction Views for Scientific Workflow Provenance Querying
bstraction Views for Scientific Workflow Provenance Querying Artem Chebotko, Member, IEEE, Shiyong Lu, Senior Member, IEEE, Seunghan Chang, Farshad Fotouhi, Member, IEEE, and Ping ...
Artem Chebotko, Shiyong Lu, Seunghan Chang, Farsha...
BMCBI
2008
77views more  BMCBI 2008»
15 years 4 months ago
Stochastic models for the in silico simulation of synaptic processes
Background: Research in life sciences is benefiting from a large availability of formal description techniques and analysis methodologies. These allow both the phenomena investiga...
Andrea Bracciali, Marcello Brunelli, Enrico Catald...
CCS
2005
ACM
15 years 10 months ago
Keyboard acoustic emanations revisited
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and t...
Li Zhuang, Feng Zhou, J. D. Tygar
JMS
2010
139views more  JMS 2010»
15 years 3 months ago
Application of Portable CDA for Secure Clinical-document Exchange
Health Level Seven (HL7) organization published the Clinical Document Architecture (CDA) for exchanging documents among heterogeneous systems and improving medical quality based on...
Kuo-Hsuan Huang, Sung-huai Hsieh, Yuan-Jen Chang, ...