Browsing by Subject "Security of data"
Now showing items 1-13 of 13
-
Conference Object
Color multiscale texture classification of hysteroscopy images of the endometrium
(2008)The objective of this study was to investigate the diagnostic performance of a Computer Aided Diagnostic (CAD) system based on color multiscale texture analysis for the classification of hysteroscopy images of the endometrium, ...
-
Conference Object
Data protection issues of integrated Electronic Health Records (EHR)
(Springer Verlag, 2016)An Electronic Health Record (EHR) of a patient in perspective maintains the medical history of the citizen electronically in medical databanks serviced locally or is cloud based. The ownership and the access control should ...
-
Article
A graph-theoretic network security game
(2005)Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. We model this practical network scenario as a non-cooperative multi-player game on ...
-
Conference Object
A grid-enabled digital library system for natural disaster metadata
(2005)The need to organize and publish metadata about European research results in the field of natural disasters has been met with the help of two innovative technologies: the Open Grid Service Architecture (OGSA) and the ...
-
Article
Guest editorial cardiovascular health informatics: Risk screening and intervention
(2012)Despite enormous efforts to prevent cardiovascular disease (CVD) in the past, it remains the leading cause of death in most countries worldwide. Around two-thirds of these deaths are due to acute events, which frequently ...
-
Conference Object
IHIP: Towards a user centric Individual Human Interaction Proof framework
(Association for Computing Machinery, 2015)A Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a widely used Human Interaction Proof mechanism to protect on-line services against automated software agents. Nowadays, there is a ...
-
Article
Key issues for the design and development of mobile commerce services and applications
(2005)This paper suggests a new approach for developing m-commerce services and applications based on a scheme that divides m-applications into directory- and transaction-oriented classes, identifies mobile user requirements, ...
-
Article
Multi-set DHT for range queries on dynamic data for grid information service
(2008)Scalability is a fundamental problem for information systems when the amount of managed data increases. Peer to Peer systems are usually used to solve scalability problems as centralized approaches do not scale without ...
-
Conference Object
Notions of security and opacity in discrete event systems
(2007)In this paper, we follow a state-based approach to extend the notion of opacity in computer security to discrete event systems. A system is (S, P)-opaque if the evolution of its true state through a set of secret states S ...
-
Article
Risk modeling and analysis of interdependencies of critical infrastructures using colored timed petri nets
(2015)Petri Nets (PNs) and their variations are a graphical, mathematical language that can be used for the specification, analysis and verification of discrete event systems, including Critical Infrastructures (CIs). Colored ...
-
Article
Studying the effect of human cognition on text and image recognition CAPTCHA mechanisms
(2013)This paper investigates the effect of individual differences in human cognition on user performance in CAPTCHA tasks. In particular, a three-month ecological valid user study was conducted with a total of 107 participants ...
-
Article
Using argumentation logic for firewall policy specification and analysis
(2006)Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. Given their widespread use, it is crucial that ...
-
Conference Object
A utility-based adaptivity model for mobile applications
(2007)Mobile environments are characterized by resource fluctuations and limitations, and variations in user preferences. Therefore mobile applications need to be adaptive to retain usability, usefulness and reliability. In our ...