Sciweavers

519 search results - page 45 / 104
» Enhancing information systems security in an academic organi...
Sort
View
IEEEARES
2008
IEEE
14 years 2 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
ACSAC
2001
IEEE
13 years 11 months ago
Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care
Shared Care is the common answer to the challenge for improving health system's quality and efficiency. This development must be accompanied by implementing shared care infor...
Bernd Blobel
BMCBI
2010
191views more  BMCBI 2010»
13 years 8 months ago
BiGG: a Biochemical Genetic and Genomic knowledgebase of large scale metabolic reconstructions
Background: Genome-scale metabolic reconstructions under the Constraint Based Reconstruction and Analysis (COBRA) framework are valuable tools for analyzing the metabolic capabili...
Jan Schellenberger, Junyoung O. Park, Tom M. Conra...
CASES
2010
ACM
13 years 6 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
ACSAC
2002
IEEE
14 years 1 months ago
A Context-Aware Security Architecture for Emerging Applications
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...