Sciweavers

1398 search results - page 75 / 280
» Medical Database Security
Sort
View
COMPSYSTECH
2010
13 years 9 months ago
An approach for node identification and key management in sensor grids
Security of sensor grids is important especially for surveillance, military and medical applications. The paper addresses methods for two security features. First, an approach for ...
Iliya Georgiev
ICIP
2010
IEEE
13 years 7 months ago
A classifier based approach for the detection of potential threats in CT based Baggage Screening
Recent years have seen increased use of Computed Tomography (CT) based Unaccompanied Baggage and Package Screening (UBPS) systems for luggage examination to ensure air travel secu...
Najla Megherbi, Gregory T. Flitton, Toby P. Brecko...
DEXAW
1998
IEEE
122views Database» more  DEXAW 1998»
14 years 1 months ago
A Prototype Model for Data Warehouse Security Based on Metadata
The aim of this paper is to give an overview of security relevant aspects of existing OLAP/Data Warehouse solutions, an area which has seen rather little interest from product dev...
Nevana Katic, Gerald Quirchmayr, Josef Schiefer, M...
TRUSTBUS
2007
Springer
14 years 3 months ago
Securing VO Management
Abstract. In this paper we propose a security architecture and mechanism for Virtual Organizations (VO) for businesses. The VOs we consider are based on web service technology to a...
Florian Kerschbaum, Rafael Deitos, Philip Robinson
ICDE
2008
IEEE
131views Database» more  ICDE 2008»
14 years 3 months ago
PLUS: Synthesizing privacy, lineage, uncertainty and security
— Privacy, lineage, uncertainty, and security are important to many information integration efforts, and these “PLUS” properties interact in a number of complex ways. This pa...
Barbara T. Blaustein, Len Seligman, Michael Morse,...