Sciweavers

1401 search results - page 161 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
UIALL
2004
Springer
14 years 2 months ago
Adaptive User Modelling in AthosMail
In this paper we discuss the adaptive User Model component of the AthosMail system, and describe especially the Cooperativity Model which produces recommendations for the appropria...
Kristiina Jokinen, Kari Kanto, Jyrki Rissanen
CCS
2007
ACM
14 years 3 months ago
Preserving privacy in gps traces via uncertainty-aware path cloaking
Motivated by a probe-vehicle based automotive traffic monitoring system, this paper considers the problem of guaranteed anonymity in a dataset of location traces while maintainin...
Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabad...
PCI
2009
Springer
14 years 1 months ago
A Foundation for Defining Security Requirements in Grid Computing
—Despite the wide adoption by the scientific community, grid technologies have not been given the appropriate attention by enterprises. This is merely due to the lack of enough s...
Antonios Gouglidis, Ioannis Mavridis
USENIX
2003
13 years 10 months ago
CUP: Controlled Update Propagation in Peer-to-Peer Networks
— This paper proposes CUP, a protocol for performing Controlled Update Propagation to maintain caches of metadata in peer-to-peer networks. To moderate propagation without imposi...
Mema Roussopoulos, Mary Baker
ICCS
2004
Springer
14 years 2 months ago
Demonstrating Wireless IPv6 Access to a Federated Health Record Server
: This paper describes the practical implementation of a federated health record server based on a generic and comprehensive architecture, deployed in a live clinical setting and a...
Dipak Kalra, David Ingram, A. Austin, V. Griffith,...