Sciweavers

220 search results - page 28 / 44
» Trusted business system model using context sensitiveness
Sort
View
HICSS
2003
IEEE
144views Biometrics» more  HICSS 2003»
14 years 28 days ago
A Self-Disclosure Model for Personal Health Information
The use of information technologies (IT) to collect personal health information is growing in popularity via computer-assisted interviewing and a wide variety of healthcare Web si...
Lotus E. Kam, William G. Chismar
ACSAC
2005
IEEE
14 years 1 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
BPM
2004
Springer
119views Business» more  BPM 2004»
14 years 1 months ago
A Workflow-Oriented System Architecture for the Management of Container Transportation
In this paper, we introduce a workflow-oriented system architecture for the processing of client requests (CRs) for container transportation. In the context of multi-transfer conta...
Sarita Bassil, Rudolf K. Keller, Peter G. Kropf
POPL
2012
ACM
12 years 3 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
BPM
2007
Springer
258views Business» more  BPM 2007»
13 years 11 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge