Sciweavers

1398 search results - page 53 / 280
» Medical Database Security
Sort
View
ACSAC
2001
IEEE
14 years 19 days ago
Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care
Shared Care is the common answer to the challenge for improving health system's quality and efficiency. This development must be accompanied by implementing shared care infor...
Bernd Blobel
IHI
2010
197views Healthcare» more  IHI 2010»
13 years 3 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
DBSEC
2003
149views Database» more  DBSEC 2003»
13 years 10 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
INFOSCALE
2007
ACM
13 years 10 months ago
A flexible mandatory access control policy for XML databases
A flexible mandatory access control policy (MAC) for XML databases is presented in this paper. The label type and label access policy can be defined according to the requirements ...
Hong Zhu, Renchao Jin, Kevin Lü
CSREASAM
2006
13 years 10 months ago
Security Requirements for Multimodal Biometric Systems
Biometrics systems are automated systems that recognize a person based on physical or behavioral characteristics. There are a number of primary biometric disciplines including fin...
Kevin Daimi, Katherine Snyder