Sciweavers

1398 search results - page 67 / 280
» Medical Database Security
Sort
View
CBMS
2004
IEEE
14 years 23 days ago
A Tool for Collection of Region Based Data from Uterine Cervix Images for Correlation of Visual and Clinical Variables Related t
The National Cancer Institute (NCI) is collaborating with the National Library of Medicine (NLM) to create a database of digitized images of the uterine cervix for research, train...
Jose Jeronimo, Mark Schiffman, L. Rodney Long, Lei...
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
14 years 3 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
VLDB
2002
ACM
165views Database» more  VLDB 2002»
13 years 8 months ago
Chip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural ...
Luc Bouganim, Philippe Pucheral
IJMI
2007
140views more  IJMI 2007»
13 years 9 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
DEXAW
2003
IEEE
93views Database» more  DEXAW 2003»
14 years 2 months ago
A business process-driven approach to security engineering
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical ...
Antonio Mana, José A. Montenegro, Carsten R...