Sciweavers

2272 search results - page 351 / 455
» Provable Data Privacy
Sort
View
CCS
2008
ACM
13 years 11 months ago
A formal framework for reflective database access control policies
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an acce...
Lars E. Olson, Carl A. Gunter, P. Madhusudan
EUROSEC
2008
ACM
13 years 11 months ago
Logging based IP Traceback in switched ethernets
IP Traceback systems facilitate tracing of IP packets back to their origin, despite possibly forged or overwritten source address data. A common shortcoming of existing proposals ...
Marios S. Andreou, Aad P. A. van Moorsel
EUROSEC
2008
ACM
13 years 11 months ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero
MIE
2008
125views Healthcare» more  MIE 2008»
13 years 10 months ago
Knowledge Management for the Protection of Information in Electronic Medical Records
: This paper describes foundational work investigating the protection requirements of sensitive medical information, which is being stored more routinely in repository systems for ...
Nathan Lea, Stephen Hailes, Tony Austin, Dipak Kal...
IFIP11
2004
141views Business» more  IFIP11 2004»
13 years 10 months ago
Identity Management for Self-Portrayal
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
Tobias Baier, Christian P. Kunze