Sciweavers

1398 search results - page 58 / 280
» Medical Database Security
Sort
View
BMCBI
2005
91views more  BMCBI 2005»
13 years 9 months ago
COPASAAR - A database for proteomic analysis of single amino acid repeats
Background: Single amino acid repeats make up a significant proportion in all of the proteomes that have currently been determined. They have been shown to be functionally and med...
Daniel P. Depledge, Andrew R. Dalby
SP
1996
IEEE
14 years 1 months ago
View-Based Access Control with High Assurance
View-based access control enables content-based and context-based security, as opposed to container-based security provided in operating systems. However, view-based access contro...
Xiaolei Qian
ETFA
2005
IEEE
14 years 2 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
SEC
2008
13 years 10 months ago
ASTRA : A Security Analysis Method Based on Asset Tracking
ASTRA is a security analysis method based on the systematic collection and analysis of security relevant information to detect inconsistencies and assess residual risks. ASTRA can ...
Daniel Le Métayer, Claire Loiseaux
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
14 years 9 months ago
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Murat Kantarcioglu, Jiashun Jin, Chris Clifton