Sciweavers

119 search results - page 16 / 24
» Integrating usability and accessibility in information assur...
Sort
View
DEXA
2003
Springer
222views Database» more  DEXA 2003»
14 years 1 months ago
Process Data Store: A Real-Time Data Store for Monitoring Business Processes
With access to real-time information on critical performance indicators of business processes, managers and staff members can play a crucial role in improving the speed and effecti...
Josef Schiefer, Beate List, Robert M. Bruckner
IHI
2012
217views Healthcare» more  IHI 2012»
12 years 4 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
CCS
2008
ACM
13 years 10 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
TITB
2010
128views Education» more  TITB 2010»
13 years 3 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...
CORR
2006
Springer
154views Education» more  CORR 2006»
13 years 8 months ago
Intra-site Level Cultural Heritage Documentation: Combination of Survey, Modeling and Imagery Data in a Web Information System
Cultural heritage documentation induces the use of computerized techniques to manage and preserve the information produced. Geographical information systems have proved their pote...
Anne Durand, Pierre Drap, Elise Meyer, Pierre Grus...