Sciweavers

4413 search results - page 67 / 883
» Security for biometric data
Sort
View
DMDW
2000
118views Management» more  DMDW 2000»
13 years 11 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
HICSS
2000
IEEE
121views Biometrics» more  HICSS 2000»
14 years 2 months ago
Combining Data from Existing Company Data Sources: Architecture and Experiences
Combining and utilizing data from different sources is a common problem in many companies today. Useful data can be found in various applications, such as spreadsheets, project ma...
Jari Vanhanen, Kai Risku, Pekka Kilponen
HICSS
2012
IEEE
322views Biometrics» more  HICSS 2012»
12 years 5 months ago
Exploring the Motive for Data Publication in Open Data Initiative: Linking Intention to Action
This research study was designed to broaden understanding of the publishing of research datasets by distinguishing between the intention to share and the action of sharing. The da...
Djoko Sigit Sayogo, Theresa A. Pardo
IEEEARES
2010
IEEE
14 years 4 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
CODASPY
2011
13 years 1 months ago
The challenge of data and application security and privacy (DASPY): are we up to it
This talk gives a personal perspective on the topic area of this new conference on data and application security and privacy, the difficult nature of the challenge we are confron...
Ravi S. Sandhu