Sciweavers

94 search results - page 8 / 19
» Towards Data Protection Compliance
Sort
View
ICRA
2010
IEEE
727views Robotics» more  ICRA 2010»
13 years 8 months ago
Ankle and hip balance control strategies with transitions
— A method for implementing the ankle and hip balance control strategies, well known from studies on human balance control, is suggested. The moment of the acting disturbance for...
Yoshikazu Kanamiya, Shun Ota, Daisuke Sato
BIOSIG
2009
127views Biometrics» more  BIOSIG 2009»
13 years 7 months ago
Supplemental Biometric User Authentication for Digital-Signature Smart Cards
: This paper specifies how biometric verification methods can be applied in addition to PIN verification on digital-signature smart cards in compliance with established smart-card ...
Olaf Henniger, Ulrich Waldmann
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
14 years 11 months ago
Auditing a Database under Retention Restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a histor...
Wentian Lu, Gerome Miklau
SAC
2009
ACM
14 years 4 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
BPSC
2009
190views Business» more  BPSC 2009»
13 years 11 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann