Sciweavers

1401 search results - page 148 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
ETRICS
2006
14 years 18 days ago
Requirements of Information Reductions for Cooperating Intrusion Detection Agents
Abstract. We consider cooperating intrusion detection agents that limit the cooperation information flow with a focus on privacy and confidentiality. Generalizing our previous work...
Ulrich Flegel, Joachim Biskup
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
14 years 29 days ago
The impact of technology on the quality of information
When new technologies for production and dissemination of information emerge and are adopted, we see a dramatic increase in the quantity of information that is made available for ...
Aditi Mukherjee, Jungpil Hahn
HICSS
2000
IEEE
154views Biometrics» more  HICSS 2000»
14 years 1 months ago
User-Interface Design for Medical Informatics: A Case Study of Kaiser Permanente
User interfaces (Uis) for client-server-and Web-based products and services must enable users around the world to access complex data and functions. Solutions to successful user-i...
Aaron Marcus, Karl Wieser, John Armitage, Volker F...
SIGUCCS
2005
ACM
14 years 2 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
ACMSE
2008
ACM
13 years 11 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins