Sciweavers

1801 search results - page 56 / 361
» Implementation-Oriented Secure Architectures
Sort
View
JSW
2008
240views more  JSW 2008»
13 years 8 months ago
A Secure e-Health Architecture based on the Appliance of Pseudonymization
Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massiv...
Bernhard Riedl, Veronika Grascher, Thomas Neubauer
DEXAW
1999
IEEE
75views Database» more  DEXAW 1999»
14 years 9 days ago
Coordination of Security Levels for Internet Architectures
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Eduardo B. Fernández
P2P
2003
IEEE
14 years 1 months ago
Secure and Resilient Peer-to-Peer E-Mail: Design and Implementation
E-mail is a mission-critical communication function for virtually all institutions. Modern e-mail employs a servercentric design, in which the user is critically dependent on her ...
Jussi Kangasharju, Keith W. Ross, David A. Turner
PERCOM
2005
ACM
14 years 7 months ago
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
Vipul Gupta, Michael Wurm, Yu Zhu, Matthew Millard...
DRM
2006
Springer
13 years 11 months ago
Towards a secure and interoperable DRM architecture
In this paper we look at the problem of interoperability of digital rights management (DRM) systems in home networks. We introduce an intermediate module called the Domain Interop...
Gelareh Taban, Alvaro A. Cárdenas, Virgil D...