Sciweavers

1618 search results - page 109 / 324
» Privacy Interfaces for Information Management
Sort
View
ITCC
2002
IEEE
14 years 2 months ago
Providing an Infrastructure for A Cross Database Management Tool
Software tools used to administer databases are vendor specific, proprietary, and require extensive prior database knowledge on the part of the database professional. We present d...
Régis Charlot
JMS
2006
90views more  JMS 2006»
13 years 9 months ago
Healthcare Informatics Research: From Data to Evidence-Based Management
Healthcare informatics research is a scientific endeavor that applies information science, computer technology, and statistical modeling techniques to develop decision support syst...
Thomas T. H. Wan
CHI
1995
ACM
14 years 20 days ago
Finding and Using Implicit Structure in Human-Organized Spatial Layouts of Information
Many interfaces allow users to manipulate graphical objects, icons representing underlying data or the data themselves, against a spatial backdrop or canvas. Users take advantage ...
Frank M. Shipman III, Catherine C. Marshall, Thoma...
IDTRUST
2009
ACM
14 years 3 months ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta
ACSAC
2000
IEEE
14 years 1 months ago
Calculating Costs for Quality of Security Service
This paper presents a Quality of Security Service (QoSS) costing framework and demonstration. A method for quantifying costs related to the security service and for storing and re...
E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvin...