Sciweavers

947 search results - page 13 / 190
» Information Security in Mobile Databases
Sort
View
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
14 years 1 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
IJMI
2007
140views more  IJMI 2007»
13 years 7 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
PST
2004
13 years 8 months ago
Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security Challenges
Driven by the ubiquitous deployment of mobile systems, the widespread use of the Internet, the rapid advances in wireless technologies, the insatiable demand for high-speed interac...
Ali Grami, Bernadette Schell
WISTP
2010
Springer
14 years 2 months ago
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to perform specific tasks such as transferring or comparing fingerprints of inf...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
DEXAW
2000
IEEE
132views Database» more  DEXAW 2000»
13 years 11 months ago
On Integrating Mobile Devices into a Workflow Management Scenario
While the desire to gain full access to stationary information sources (e.g. the company
Stefan Müller-Wilken, Frank Wienberg, Winfrie...