-
1
-
-
0012075996
-
Requirements and mechanisms of IT-security including aspects of multimedia security
-
Bristol, UK, September 1998, edited by S. Dittmann, P. Wohlmocher, P. Horster, R. Steinmetz
-
WOHLMACHER, P., 1998, Requirements and mechanisms of IT-security including aspects of multimedia security. Proceedings of the Multimedia and Security Workshop at ACM Multimedia '98, Bristol, UK, September 1998, edited by S. Dittmann, P. Wohlmocher, P. Horster, R. Steinmetz, pp. 11-19.
-
(1998)
Proceedings of the Multimedia and Security Workshop at ACM Multimedia '98
, pp. 11-19
-
-
Wohlmacher, P.1
-
2
-
-
0028928963
-
Authentication of digital medical images with digital signature technology
-
SMITH, J. P., 1995, Authentication of digital medical images with digital signature technology. Radiology, 194, 771-774.
-
(1995)
Radiology
, vol.194
, pp. 771-774
-
-
Smith, J.P.1
-
3
-
-
57349200738
-
A cryptologic-based trust center for authenticating medical images
-
WONG, S. T. C., 1996, A cryptologic-based trust center for authenticating medical images. J. American Medical Informatics Assoc., 3, 410-421.
-
(1996)
J. American Medical Informatics Assoc.
, vol.3
, pp. 410-421
-
-
Wong, S.T.C.1
-
4
-
-
58849112169
-
Overview of image security techniques with applications in multimedia systems
-
3228, 2-5 November 1997, Dallas, Texas
-
WOLFGANG, R. B. and DELP, E. J., 1997, Overview of image security techniques with applications in multimedia systems. Proceedings of the SPIE Conference on Multimedia Networks: Security, Displays, Terminals and Gateways, 3228, 2-5 November 1997, Dallas, Texas, pp. 297-308.
-
(1997)
Proceedings of the SPIE Conference on Multimedia Networks: Security, Displays, Terminals and Gateways
, pp. 297-308
-
-
Wolfgang, R.B.1
Delp, E.J.2
-
6
-
-
4243328337
-
Digital watermarking and medical imaging
-
Cryptography Course homepage, 8 November 2000. Available at
-
BERRY RIT, T., 2000, Digital watermarking and medical imaging. Cryptography Course homepage, 8 November 2000. Available at http://citeseer.nj.com/406247.html.
-
(2000)
-
-
Berry Rit, T.1
-
8
-
-
0003039563
-
eMEDAC: Role-based access control supporting discretionary and mandatory features
-
Seattle, Washington, USA, edited by V. Atluri and J. Hale (Kluwer Academic Publishers)
-
MAVRIDIS, I., PANGALOS, G. and KHAIR, M., 1999, eMEDAC: Role-based access control supporting discretionary and mandatory features. Proceedings of the 13th IFIP WG 11.3 Working Conference on Database Security, Seattle, Washington, USA, edited by V. Atluri and J. Hale (Kluwer Academic Publishers), pp. 63-78.
-
(1999)
Proceedings of the 13th IFIP WG 11.3 Working Conference on Database Security
, pp. 63-78
-
-
Mavridis, I.1
Pangalos, G.2
Khair, M.3
-
9
-
-
0031387996
-
Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
-
Fairfax, VA, USA
-
THOMAS, R. K., 1997, Team-based access control (TMAC: A primitive for applying role-based access controls in collaborative environments. Proceedings of the ACM RBAC '97, Fairfax, VA, USA, pp. 13-19.
-
(1997)
Proceedings of the ACM RBAC '97
, pp. 13-19
-
-
Thomas, R.K.1
-
10
-
-
0012077288
-
-
RATIONAL SOFTWARE CORPORATION, Object Constraint Language Specification, Version 1.1 Available at September 1997
-
RATIONAL SOFTWARE CORPORATION, 1997, Object Constraint Language Specification, Version 1.1, Available at http://www.rational.com/uml/, September 1997.
-
(1997)
-
-
-
11
-
-
0030701779
-
Creation and content-based retrieval in a radiological documentary record
-
Biarritz, France, July 2-4 (IEEE Press)
-
TCHOUNIKINE, A., 1997, Creation and content-based retrieval in a radiological documentary record. Proceedings of the 3rd Basque International Workshop on Information Technology, Biarritz, France, July 2-4 (IEEE Press) pp. 111-117.
-
(1997)
Proceedings of the 3rd Basque International Workshop on Information Technology
, pp. 111-117
-
-
Tchounikine, A.1
-
12
-
-
0012071375
-
Security in teleradiology systems: Requirements and proposed mechanisms
-
Submitted to Dr Ralph Martinez, Electrical and Computer Engineering Department, University of Arizona for ECE678, Integrated Telecommunications Networks Spring Semester, 1997
-
MEDENIS, M. M., 1997, Security in teleradiology systems: requirements and proposed mechanisms. Submitted to Dr Ralph Martinez, Electrical and Computer Engineering Department, University of Arizona for ECE678, Integrated Telecommunications Networks Spring Semester, 1997.
-
(1997)
-
-
Medenis, M.M.1
-
13
-
-
58849112169
-
Overview of image security techniques with applications in multimedia systems
-
3228, 2-5 November 1997, Dallas, Texas
-
WOLFGANG, R. B. and DELP, E. J., 1997, Overview of image security techniques with applications in multimedia systems. Proceedings of the SPIE Conference on Multimedia Networks: Security, Displays, Terminals and Gateways, 3228, 2-5 November 1997, Dallas, Texas, pp. 297-3308.
-
(1997)
Proceedings of the SPIE Conference on Multimedia Networks: Security, Displays, Terminals and Gateways
, pp. 297-3308
-
-
Wolfgang, R.B.1
Delp, E.J.2
-
14
-
-
0031365182
-
Role templates for content-based access control
-
November 1997, Fairfax, VA, USA
-
GIURI, L. and IGLIO, P., 1997, Role templates for content-based access control. Proceedings of the Second ACM Role-Based Access Control Workshop, November 1997, Fairfax, VA, USA, pp. 153-159.
-
(1997)
Proceedings of the Second ACM Role-Based Access Control Workshop
, pp. 153-159
-
-
Giuri, L.1
Iglio, P.2
-
15
-
-
0031382488
-
Reconciling role-based management and role-based access control
-
November 1997, Fairfax, VA, USA
-
LUPU, E. C. and SLOMAN, M., 1997, Reconciling role-based management and role-based access control. Proceedings of the Second ACM Role-Based Access Control Workshop, November 1997, Fairfax, VA, USA, pp. 135-141.
-
(1997)
Proceedings of the Second ACM Role-Based Access Control Workshop
, pp. 135-141
-
-
Lupu, E.C.1
Sloman, M.2
-
16
-
-
0030197920
-
Design methods and architectural issues of integrated medical image data based systems
-
WONG, S. T. C. and HUANG, H. K., 1996, Design methods and architectural issues of integrated medical image data based systems. Computerized Medical Imaging and Graphics, 20, 285-299.
-
(1996)
Computerized Medical Imaging and Graphics
, vol.20
, pp. 285-299
-
-
Wong, S.T.C.1
Huang, H.K.2
-
17
-
-
0030086382
-
Role-based access control models
-
SANDHU, R., COYNEE, E. J., FEINSTEINN, H. L. and YOUMAN, C. E., 1996, Role-based access control models. IEEE Computer, 29, 38-47.
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.1
Coynee, E.J.2
Feinsteinn, H.L.3
Youman, C.E.4
-
18
-
-
0032847955
-
Validation of statistical parametric mapping (SPM) in assessing cerebral lesions: A simulation study
-
STAMATAKIS, E. A., GLABUS, M. F., WYPER, D. J., BARNES, A. and WILSON, J. T. L., 1999, Validation of statistical parametric mapping (SPM) in assessing cerebral lesions: a simulation study. Neuroimage, 10, 397-407.
-
(1999)
Neuroimage
, vol.10
, pp. 397-407
-
-
Stamatakis, E.A.1
Glabus, M.F.2
Wyper, D.J.3
Barnes, A.4
Wilson, J.T.L.5
|