Sciweavers

3452 search results - page 42 / 691
» Secure Data Outsourcing
Sort
View
CSREASAM
2006
13 years 11 months ago
Data Security and wireless networks: mutually exclusive?
- The increased use and popularity of wireless networks has seen their adoption in medical information systems. They provide the advantages of mobility and instant information avai...
Andrew Woodward
ICDE
2006
IEEE
104views Database» more  ICDE 2006»
14 years 3 months ago
Trusted CVS
The CVS (Concurrent Versions System) software is a popular method for recording modifications to data objects, in addition to concurrent access to data in a multi-user environmen...
Muthuramakrishnan Venkitasubramaniam, Ashwin Macha...
OTM
2005
Springer
14 years 3 months ago
Semantics of Agent-Based Service Delegation and Alignment
In this paper we will concentrate on the conceptual modeling and semantics of service delegation and alignment in information systems. In delegation, one typically has the situatio...
Herman Balsters, G. B. Huitema, Nicolae B. Szirbik
HICSS
2011
IEEE
203views Biometrics» more  HICSS 2011»
13 years 1 months ago
Will HITECH Heal Patient Data Hemorrhages?
Hemorrhages of confidential patient health data create privacy and security concerns. While the US HIPAA legislation on privacy and security went into effect over five years ago, ...
M. Eric Johnson, Nicholas D. Willey
ESORICS
2004
Springer
14 years 3 months ago
Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data
As network traffic increases, the problems associated with monitoring and analyzing the traffic on high speed networks become increasingly difficult. In this paper, we introduce a ...
John McHugh