Sciweavers

651 search results - page 18 / 131
» Security of Electronic Money
Sort
View
IJMI
2007
140views more  IJMI 2007»
13 years 7 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
MA
1999
Springer
133views Communications» more  MA 1999»
13 years 12 months ago
Establishing a Secure Open-Environment for Using Mobile Agents in Electronic Commerce
Although mobile agents are a promising technology, the large-scale deployment of agents and the existence of hosts running agencies will not happen until proper security mechanism...
Paulo Marques, Luís Moura Silva, Joã...
WER
2005
Springer
14 years 1 months ago
Requirement Elicitation Based on Goals with Security and Privacy Policies in Electronic Commerce
This paper describes a method for requirements elicitation based on goals for electronic commerce systems in agreement with security and privacy polices of the site. The method in...
Simara Vieira da Rocha, Zair Abdelouahab, Eduardo ...
SRDS
1999
IEEE
13 years 12 months ago
Security Mechanisms for using Mobile Agents in Electronic Commerce
In order for mobile agents to be accepted as a basic technology for enabling electronic commerce, proper security mechanisms must be developed. Hosts must be protected from malici...
Paulo Marques, Luís Moura Silva, Joã...
SAFECOMP
2007
Springer
14 years 1 months ago
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety
The general trend towards ubiquitous networking has reached the realm of airplanes. E-enabled airplanes with wired and wireless network interfaces offer a wide spectrum of network ...
Richard Robinson, Mingyan Li, Scott Lintelman, Kri...