Sciweavers

1401 search results - page 114 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
DBSEC
2010
162views Database» more  DBSEC 2010»
13 years 10 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
IHI
2012
285views Healthcare» more  IHI 2012»
12 years 4 months ago
Towards HIPAA-compliant healthcare systems
In healthcare domain, there is a gap between healthcare systems and government regulations such as the Health Insurance Portability and Accountability Act (HIPAA). The violations ...
Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu
FDL
2004
IEEE
14 years 22 days ago
Real-Time Operating System Services for Realistic SystemC Simulation Models of Embedded Systems
gn process of embedded systems moves currently towards higher levels of abstraction. As a consequence, a need arises for an early and realistic assessment of system level design d...
P. Hastono, Stephan Klaus, Sorin A. Huss
SICHERHEIT
2010
13 years 6 months ago
A Fuzzy Model for IT Security Investments
: This paper presents a fuzzy set based decision support model for taking uncertainty into account when making security investment decisions for distributed systems. The proposed m...
Guido Schryen
WWW
2009
ACM
14 years 9 months ago
Bucefalo: a tool for intelligent search and filtering for web-based personal health records
In this poster, a tool named BUCEFALO is presented. This tool is specially designed to improve the information retrieval tasks in web-based Personal Health Records (PHR). This too...
Francisco P. Romero, Jesús Serrano-Guerrero...