Zobrazeno 1 - 10
of 29
pro vyhledávání: '"H. Chinaei"'
Autor:
Juan Rafael Orozco-Arroyave, Juan Camilo Vásquez-Correa, Jesús Francisco Vargas-Bonilla, R. Arora, N. Dehak, P.S. Nidadavolu, H. Christensen, F. Rudzicz, M. Yancheva, H. Chinaei, A. Vann, N. Vogler, T. Bocklet, M. Cernak, J. Hannink, Elmar Nöth
Publikováno v:
SoftwareX, Vol 8, Iss , Pp 69-70 (2018)
NeuroSpeech is a software for modeling pathological speech signals considering different speech dimensions: phonation, articulation, prosody, and intelligibility. Although it was developed to model dysarthric speech signals from Parkinson’s patient
Externí odkaz:
https://doaj.org/article/3da6e933650246a582c8abd1cd9f4907
Publikováno v:
Knowledge-Based Systems. 101:71-89
We define a privacy model based on k-anonymity and one of its strong refinements to prevent the background knowledge attack.We propose two hierarchical anonymization algorithm to satisfy our privacy model.Our algorithms outperform the state-of the ar
Publikováno v:
DATA
Userâs private data might be secretly retrieved for or against them every time they browse the web or use email services. This study addresses how these services could secretly retrieve such data. While users may appreciate these techniques as a
Publikováno v:
EDBT/ICDT Workshops
Efficient and privacy-preserved access to the health record of patients is necessary to correctly practice medicine. This research addresses two concerns in emerging health software systems. First, electronic health records are not yet remotely acces
Publikováno v:
ASONAM
This is a preliminary work to extend SQL to support user privacy in social networks. The proposal is to extend the data definition and data manipulation languages to capture privacy-preserved mandatory and discretionary access controls, respectively.
Publikováno v:
ASONAM
Twins are two extensions onto SQL to support user privacy in social networks: one is corporate-based and the other is user-centric, corresponding to well-known mandatory access control and discretionary access control models, respectively. This paper
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540752479
Secure Data Management
Secure Data Management
While some authorization models support either positive or negative authorizations, hybrid frameworks take advantage of both authorizations. Resolving authorization conflicts is quite a challenge due to the existence of sophisticated inheritance hier
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::430dc0be2847be6029d156c4d41539d8
https://doi.org/10.1007/978-3-540-75248-6_1
https://doi.org/10.1007/978-3-540-75248-6_1
Autor:
Huaxin Zhang, Amir H. Chinaei
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540389842
Secure Data Management
Secure Data Management
Numerous authorization models have been proposed in recent years. While some models support either positive or negative authorizations, hybrid models take advantage of both authorizations simultaneously. However, resolving authorization conflicts is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ad50bf2685790c2da26e5c41c8edcd2a
https://doi.org/10.1007/11844662_10
https://doi.org/10.1007/11844662_10
Autor:
Frank Wm. Tompa, Amir H. Chinaei
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540287988
Secure Data Management
Secure Data Management
The requirements and technologies supporting shared health record databases pose new access control challenges. This paper proposes a decentralized access control system in which corporate policy can allow all health record owners to administer acces
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::68c672b3af67e9ce0df1422fd3f49a4d
https://doi.org/10.1007/11552338_5
https://doi.org/10.1007/11552338_5
Publikováno v:
International Journal of Business Information Systems. 9:402
Social networks have become increasingly popular over the past decade, almost in all user communities. Users, in such networks, post a variety of their (personal) information on electronic profiles initially accessible by their friends, yet ultima