Sciweavers

1398 search results - page 120 / 280
» Medical Database Security
Sort
View
IIS
2000
13 years 11 months ago
Extension of the HEPAR II Model to Multiple-Disorder Diagnosis
The Hepar II system is based on a Bayesian network model of a subset of the domain of hepatology in which the structure of the network is elicited from an expert diagnostician and ...
Agnieszka Onisko, Marek Druzdezel, Hanna Wasyluk
WETICE
2007
IEEE
14 years 4 months ago
Managing Confidential Data in the gLite Middleware
How to manage confidential data in the grid environment is a critical issue because users’ data can be saved in untrusted remote storages. This paper introduces a service to sto...
Diego Scardaci, Giordano Scuderi
EUPROJECTS
2005
Springer
14 years 3 months ago
Participatory Insight to Universal Access: Methods and Validation Exercises
Participatory methods can, in principle, be applied for a variety of purposes to gain insight into the context of use of an artefact or the way in which tasks are performed by end ...
Michael Pieper, Karl Stroetmann
CISC
2009
Springer
171views Cryptology» more  CISC 2009»
13 years 8 months ago
Sanitizable Signatures with Strong Transparency in the Standard Model
Sanitizable signatures provide several security features which are useful in many scenarios including military and medical applications. Sanitizable signatures allow a semi-trusted...
Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. P...
ICDE
2008
IEEE
165views Database» more  ICDE 2008»
14 years 4 months ago
Semantic Web and firewall alignment
— Secure Semantic Web applications, particularly those involving access control, are typically focused at the application-domain only, rather than taking a more holistic approach...
Simon N. Foley, William M. Fitzgerald