Sciweavers

1398 search results - page 103 / 280
» Medical Database Security
Sort
View
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
14 years 4 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
DEXA
2003
Springer
134views Database» more  DEXA 2003»
14 years 3 months ago
Concurrent and Real-Time Update of Access Control Policies
Abstract. Access control policies are security policies that govern access to resources. Real-time update of access control policies, that is, updating policies while they are in e...
Indrakshi Ray, Tai Xin
DEXAW
1998
IEEE
94views Database» more  DEXAW 1998»
14 years 2 months ago
Towards Access Control for Logical Document Structures
This paper presents a first step towards a security model that defines access control for logical document structures. el benefits from roles to abstract from users and from secur...
Fredj Dridi, Gustaf Neumann
CIDR
2007
79views Algorithms» more  CIDR 2007»
13 years 11 months ago
Beyond Just Data Privacy
We argue that designing a system that “guarantees” the privacy of its information may not be enough. One must also consider the price for providing that protection: For exampl...
Bob Mungamuru, Hector Garcia-Molina
MIE
2008
160views Healthcare» more  MIE 2008»
13 years 11 months ago
Using Medline Queries to Generate Image Retrieval Tasks for Benchmarking
Medical visual information retrieval has been a very active research area over the past ten years as an increasing amount of images is produced digitally and made available in the ...
Henning Müller, Jayashree Kalpathy-Cramer, Wi...