Sciweavers

842 search results - page 111 / 169
» About the authors
Sort
View
JSW
2008
240views more  JSW 2008»
13 years 7 months ago
A Secure e-Health Architecture based on the Appliance of Pseudonymization
Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massiv...
Bernhard Riedl, Veronika Grascher, Thomas Neubauer
SIAMIS
2008
93views more  SIAMIS 2008»
13 years 7 months ago
Convex Source Support and Its Application to Electric Impedance Tomography
The aim in electric impedance tomography is to recover the conductivity inside a physical body from boundary measurements of current and voltage. In many situations of practical im...
Martin Hanke, Nuutti Hyvönen, Stefanie Reussw...
RE
2006
Springer
13 years 7 months ago
Identifying Nocuous Ambiguities in Natural Language Requirements
We present a novel technique that automatically alerts authors of requirements to the presence of potentially dangerous ambiguities. We first establish the notion of nocuous ambig...
Francis Chantree, Bashar Nuseibeh, Anne N. De Roec...
COMPUTER
2004
120views more  COMPUTER 2004»
13 years 7 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
COMPSEC
2002
185views more  COMPSEC 2002»
13 years 7 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz