Sciweavers

1988 search results - page 219 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
110
Voted
MOBISYS
2008
ACM
16 years 2 months ago
Virtual trip lines for distributed privacy-preserving traffic monitoring
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...
137
Voted
ADL
1998
Springer
178views Digital Library» more  ADL 1998»
15 years 6 months ago
Distributed Digital Library Architecture Incorporating Different Index Styles
The New Zealand Digital Library offers several collections of information over the World Wide Web. Although fulltext indexing is the primary access mechanism, musical collections ...
Rodger J. McNab, Ian H. Witten, Stefan J. Boddie
88
Voted
PERCOM
2006
ACM
16 years 2 months ago
Proximity Based Access Control in Smart-Emergency Departments
In this paper, we propose a Proximity Based automated Access Control (PBAC) model for smart-ED environments which improves the existing ED work-flow by automating mundane administ...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
155
Voted
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
15 years 3 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
167
Voted
IHI
2010
197views Healthcare» more  IHI 2010»
14 years 9 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...