Sciweavers

1398 search results - page 226 / 280
» Medical Database Security
Sort
View
SACMAT
2005
ACM
14 years 3 months ago
Relevancy based access control of versioned XML documents
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us w...
Mizuho Iwaihara, Somchai Chatvichienchai, Chutipor...
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
14 years 3 months ago
Evaluation of Biometric Identification in Open Systems
This paper concerns the generalizability of biometric identification results from small-sized closed systems to larger open systems. Many researchers have claimed high identificati...
Michael Gibbons, Sungsoo Yoon, Sung-Hyuk Cha, Char...
PET
2004
Springer
14 years 3 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
AGENTS
2000
Springer
14 years 2 months ago
Dataflow plan execution for software agents
Recent research has made it possible to build information agents that retrieve and integrate information from the World Wide Web. Although there now exist solutions for modeling W...
Greg Barish, Dan DiPasquo, Craig A. Knoblock, Stev...
NDSS
1998
IEEE
14 years 1 months ago
Enabling the Internet White Pages Service - the Directory Guardian
The Internet White Pages Service (IWPS) has been slow to materialise for many reasons. One of them is the security concerns that organisations have, over allowing the public to ga...
David W. Chadwick, Andrew J. Young