Sciweavers

1398 search results - page 54 / 280
» Medical Database Security
Sort
View
JNCA
2006
86views more  JNCA 2006»
13 years 9 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
DEXAW
2009
IEEE
111views Database» more  DEXAW 2009»
14 years 3 months ago
Integrating Security Patterns into the Electronic Invoicing Process
—The increasing automation of business processes is one of the main benefits of the ongoing technological evolution. Regarding e-invoices this automation process is still not op...
Michael Netter, Günther Pernul
SACMAT
2004
ACM
14 years 2 months ago
A role-based approach to access control for XML databases
In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...
Jingzhu Wang, Sylvia L. Osborn
CCS
2006
ACM
14 years 21 days ago
Securing the drop-box architecture for assisted living
Home medical devices enable individuals to monitor some of their own health information without the need for visits by nurses or trips to medical facilities. This enables more con...
Michael J. May, Wook Shin, Carl A. Gunter, Insup L...
CMIG
2010
125views more  CMIG 2010»
13 years 4 months ago
VascuSynth: Simulating vascular trees for generating volumetric image data with ground-truth segmentation and tree analysis
Automated segmentation and analysis of tree-like structures from 3D medical images are important for many medical applications, such as those dealing with blood vasculature or lun...
Ghassan Hamarneh, Preet Jassi