Sciweavers

89 search results - page 5 / 18
» Using Personal Electronic Device for Authentication-Based Se...
Sort
View
IJMI
2007
140views more  IJMI 2007»
13 years 7 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
ICDE
2007
IEEE
223views Database» more  ICDE 2007»
14 years 2 months ago
Privacy Access Control Model with Location Constraints for XML Services
Information privacy is usually concerned with the confidentiality of personal identifiable information (PII), such as electronic medical records. Nowadays XML services are used to...
Yi Zheng, Yongming Chen, Patrick C. K. Hung
DAIS
2009
13 years 8 months ago
Dependency Management in Smart Homes
In future smart homes functionality will be provided to the inhabitants by software services decoupled from the underlying hardware devices. While this will enhance flexibility and...
Daniel Retkowitz, Sven Kulle
IJIM
2008
124views more  IJIM 2008»
13 years 7 months ago
Personalization and User Profile Management
Personalization and effective user profile management will be critical to meet the individual users' needs and for achieving eInclusion and eAccessibility. This paper outlines...
Françoise Petersen, Giovanni Bartolomeo, Mi...
JUCS
2010
135views more  JUCS 2010»
13 years 6 months ago
A Service-Oriented Platform for Ubiquitous Personalized Multimedia Provisioning
: As multimedia contents are becoming widely used in ubiquitous computing environments among many application fields, e.g., education, entertainment, and live surveillance, the dem...
Zhiwen Yu, Changde Li, Xingshe Zhou, Haipeng Wang