Sciweavers

1398 search results - page 58 / 280
» Medical Database Security
Sort
View
105
Voted
BMCBI
2005
91views more  BMCBI 2005»
15 years 2 months ago
COPASAAR - A database for proteomic analysis of single amino acid repeats
Background: Single amino acid repeats make up a significant proportion in all of the proteomes that have currently been determined. They have been shown to be functionally and med...
Daniel P. Depledge, Andrew R. Dalby
114
Voted
SP
1996
IEEE
15 years 6 months ago
View-Based Access Control with High Assurance
View-based access control enables content-based and context-based security, as opposed to container-based security provided in operating systems. However, view-based access contro...
Xiaolei Qian
121
Voted
ETFA
2005
IEEE
15 years 8 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
112
Voted
SEC
2008
15 years 4 months ago
ASTRA : A Security Analysis Method Based on Asset Tracking
ASTRA is a security analysis method based on the systematic collection and analysis of security relevant information to detect inconsistencies and assess residual risks. ASTRA can ...
Daniel Le Métayer, Claire Loiseaux
133
Voted
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
16 years 3 months ago
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Murat Kantarcioglu, Jiashun Jin, Chris Clifton