Sciweavers

1403 search results - page 140 / 281
» Security Model for XML Data
Sort
View
BMCBI
2008
158views more  BMCBI 2008»
13 years 10 months ago
LC-MSsim - a simulation software for liquid chromatography mass spectrometry data
Background: Mass Spectrometry coupled to Liquid Chromatography (LC-MS) is commonly used to analyze the protein content of biological samples in large scale studies. The data resul...
Ole Schulz-Trieglaff, Nico Pfeifer, Clemens Gr&oum...
STORAGESS
2006
ACM
14 years 4 months ago
Long-term threats to secure archives
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller
IHI
2010
160views Healthcare» more  IHI 2010»
13 years 5 months ago
Securing the e-health cloud
Modern information technology is increasingly used in healthcare with the goal to improve and enhance medical services and to reduce costs. In this context, the outsourcing of com...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
EDBT
2010
ACM
208views Database» more  EDBT 2010»
14 years 5 months ago
Stream schema: providing and exploiting static metadata for data stream processing
Schemas, and more generally metadata specifying structural and semantic constraints, are invaluable in data management. They facilitate conceptual design and enable checking of da...
Peter M. Fischer, Kyumars Sheykh Esmaili, Ren&eacu...
CSFW
1999
IEEE
14 years 2 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek