Sciweavers

1398 search results - page 55 / 280
» Medical Database Security
Sort
View
CCS
2007
ACM
14 years 3 months ago
Effect of static analysis tools on software security: preliminary investigation
Static analysis tools can handle large-scale software and find thousands of defects. But do they improve software security? We evaluate the effect of static analysis tool use on s...
Vadim Okun, William F. Guthrie, Romain Gaucher, Pa...
IJMI
2002
142views more  IJMI 2002»
13 years 8 months ago
Quality assured trusted third parties for deploying secure internet-based healthcare applications
In this paper we present a complete reference framework for the provision of quality assured Trusted Third Party (TTP) services within a medical environment. The main objective is...
Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. ...
FC
2005
Springer
157views Cryptology» more  FC 2005»
14 years 2 months ago
Securing Sensitive Data with the Ingrian DataSecure Platform
Recent high profile data thefts have shown that perimeter defenses are not sufficient to secure important customer data. The damage caused by these thefts can be disastrous, and to...
Andrew Koyfman
IDEAS
2006
IEEE
99views Database» more  IDEAS 2006»
14 years 3 months ago
Securing the Borealis Data Stream Engine
As data stream management systems (DSMSs) become more and more popular, there is an increasing need to protect such systems from adversaries. In this paper we present an approach ...
Wolfgang Lindner, Jörg Meier
HICSS
2011
IEEE
335views Biometrics» more  HICSS 2011»
13 years 22 days ago
Cyberinfrastructure for Secondary Use of EHR Data: SSA's Use of the Nationwide Health Information Network
This study examined the use of the Nationwide Health Information Network as a cyberinfrastructure for secure and interoperable transport of existing clinical data from electronic ...
Sue S. Feldman, Thomas A. Horan