Sciweavers

947 search results - page 91 / 190
» Information Security in Mobile Databases
Sort
View
121
Voted
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
15 years 9 months ago
Position Statement: Methodology to Support Dependable Survivable Cyber-Secure Infrastructures
Information systems now form the backbone of nearly every government and private system. Increasingly these systems are networked together allowing for distributed operations, sha...
Frederick T. Sheldon, Stephen Gordon Batsell, Stac...
119
Voted
SDMW
2004
Springer
15 years 9 months ago
Secure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, ...
Ping Lin, K. Selçuk Candan
140
Voted
ACISP
2005
Springer
15 years 9 months ago
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management
Abstract. RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, ...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
147
Voted
DRM
2006
Springer
15 years 7 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
113
Voted
CN
1999
102views more  CN 1999»
15 years 3 months ago
Web-Enabled Smart Card for Ubiquitous Access of Patient's Medical Record
The combined benefits of smart card to support mobility in a pocket coupled with the ubiquitous access of Web technology, present a new paradigm for medical information access sys...
Alvin T. S. Chan