Sciweavers

726 search results - page 105 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
14 years 1 months ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
MICRO
2003
IEEE
116views Hardware» more  MICRO 2003»
14 years 1 months ago
Universal Mechanisms for Data-Parallel Architectures
Data-parallel programs are both growing in importance and increasing in diversity, resulting in specialized processors targeted at specific classes of these programs. This paper ...
Karthikeyan Sankaralingam, Stephen W. Keckler, Wil...
ACSAC
2002
IEEE
14 years 22 days ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
IEEEARES
2008
IEEE
14 years 2 months ago
A Security Model and its Application to a Distributed Decision Support System for Healthcare
A distributed decision support system involving multiple clinical centres is crucial to the diagnosis of rare diseases. Although sharing of valid diagnosed cases can facilitate la...
Liang Xiao 0002, Javier Vicente, Carlos Sáe...
ICAT
2006
IEEE
14 years 1 months ago
Study on Data Collaboration Service for Collaborative Virtual Geographic Environment
The use of Collaborative Virtual Geographic Environments (CVGE) is one of the most promising uses of virtual reality in geographic field. Data collaboration can support multi-direc...
Jun Zhu, Jianhua Gong, Hua Qi, Tao Song