Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Michael J. Covington"'
Publikováno v:
Computers & Security. 30:116-127
In modern healthcare environments, a fundamental requirement for achieving continuity of care is the seamless access to distributed patient health records in an integrated and unified manner, directly at the point of care. However, Electronic Health
Publikováno v:
ACM Transactions on Information and System Security. 11:1-36
Collaborative systems such as Grids provide efficient and scalable access to distributed computing capabilities and enable seamless resource sharing between users and platforms. This heterogeneous distribution of resources and the various modes of co
Publikováno v:
GIS
Wireless Positioning Systems (WPS) are popular alternative localization methods, especially in dense urban areas where GPS has known limitations. Map-matching (MM) has been used as an approach to improve the accuracy of the estimated locations of WiF
Publikováno v:
Location-Based Services Handbook ISBN: 9781315222400
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c3454a8e8e5a7c7d57157abd012d0439
https://doi.org/10.1201/9781420071986-c1
https://doi.org/10.1201/9781420071986-c1
Publikováno v:
SACMAT
In modern healthcare environments, a fundamental requirement for achieving continuity of care is the seamless access to distributed patient health records in an integrated and unified manner, directly at the point of care. However, Electronic Health
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783642033537
CollaborateCom
CollaborateCom
The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f4d91ca4a05f029e4510ecb3b458aead
https://doi.org/10.1007/978-3-642-03354-4_25
https://doi.org/10.1007/978-3-642-03354-4_25
Publikováno v:
ARES
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory locations during program execution. Most implementations of DTA are based on dynamic binary instrumentation (DBI) frameworks
Publikováno v:
AsiaCCS
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technologies have been recently proposed to provide strong isolation on applica
Publikováno v:
SACMAT
Collaborative systems such as Grids provide efficient and scalable access to distributed computing capabilities and enable seamless resource sharing between users and platforms. This heterogeneous distribution of resources and the various modes of co
Publikováno v:
Computer Security – ESORICS 2004 ISBN: 9783540229872
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6367f2a02bc9b9bcaf8678029782d44d
https://doi.org/10.1007/978-3-540-30108-0_17
https://doi.org/10.1007/978-3-540-30108-0_17