Sciweavers

536 search results - page 57 / 108
» Embedding Information Security into the Organization
Sort
View
IHI
2010
197views Healthcare» more  IHI 2010»
13 years 2 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
HICSS
2009
IEEE
129views Biometrics» more  HICSS 2009»
14 years 2 months ago
Identifying Organizational Knowledge Paths through Social Network Lens: Synthesis of Multi-Industry Case Studies
Unlike the common belief that knowledge flows mainly along the formal organizational hierarchy, recent research has pointed out an informal social network among organizational mem...
Young-Gul Kim, Sung-Byung Yang, Yong-Sauk Hau, Jeo...
CCS
2010
ACM
13 years 6 months ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi
ICDCS
2007
IEEE
14 years 2 months ago
Resilient Cluster Formation for Sensor Networks
Sensor nodes are often organized into clusters to facilitate many network operations such as data aggregation. Clustering has to be protected in hostile environments. Otherwise, a...
Donggang Liu
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson