Sciweavers

1398 search results - page 14 / 280
» Medical Database Security
Sort
View
CCS
2009
ACM
14 years 2 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...
DEXAW
2005
IEEE
124views Database» more  DEXAW 2005»
14 years 1 months ago
Ontology Engineering for the Semantic Annotation of Medical Data
Although a wide range of medical ontologies has already been deployed in the last decade, most of them follow design principles different to those required by Semantic Web applica...
Elena Paslaru Bontas, David Schlangen, Sonja Niepa...
VLDB
2004
ACM
105views Database» more  VLDB 2004»
14 years 1 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
ISBI
2006
IEEE
14 years 8 months ago
A flexible framework for Web interfaces to image databases: supporting user-defined ontologies and links to external databases
Vocabularies to describe research findings are needed to effectively use scientific databases. As understanding of data evolves, scientists need tools for extending the vocabulari...
Josiah Johnston, Arpun Nagaraja, Harry Hochheiser,...
ESORICS
2009
Springer
13 years 11 months ago
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia,...