Sciweavers

806 search results - page 146 / 162
» Privacy Policy Referencing
Sort
View
SAC
2009
ACM
14 years 2 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
BPM
2007
Springer
258views Business» more  BPM 2007»
14 years 1 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
CHIMIT
2007
ACM
14 years 1 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
13 years 11 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...
ECEH
2006
155views Healthcare» more  ECEH 2006»
13 years 11 months ago
A Data Network for Health e-Research
: Sharing health data for research purposes across data custodian boundaries poses technical, organisational and ethical challenges. We describe a service oriented architecture for...
Kerry L. Taylor, Christine M. O'Keefe, John Colton...