Sciweavers

344 search results - page 4 / 69
» Process Modeling as a Basis for Auditing Information Privacy
Sort
View
BPM
2005
Springer
113views Business» more  BPM 2005»
14 years 1 months ago
Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models
Most information systems log events (e.g., transaction logs, audit trails) to audit and monitor the processes they support. At the same time, many of these processes have been expl...
Anne Rozinat, Wil M. P. van der Aalst
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 11 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
DASFAA
2010
IEEE
148views Database» more  DASFAA 2010»
13 years 11 months ago
Competitive Privacy: Secure Analysis on Integrated Sequence Data
Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applica...
Raymond Chi-Wing Wong, Eric Lo
JAMIA
2010
131views more  JAMIA 2010»
13 years 2 months ago
The Enterprise Data Trust at Mayo Clinic: a semantically integrated warehouse of biomedical data
Mayo Clinic's Enterprise Data Trust is a collection of data from patient care, education, research, and administrative transactional systems, organized to support information...
Christopher G. Chute, Scott A. Beck, Thomas B. Fis...
IEEESP
2010
101views more  IEEESP 2010»
13 years 6 months ago
Preserving Privacy Based on Semantic Policy Tools
Abstract—Private data of individuals is constantly being collected, analyzed, and stored by different kinds of organizations: shopping sites to provide better service and recomme...
Lalana Kagal, Joe Pato