-
2
-
-
0034198281
-
Improving the delivery ofcare and reducing healthcare costs with the digitization of information
-
R. Noffsinger and S. Chin, "Improving the delivery ofcare and reducing healthcare costs with the digitization of information," J. of Healthcare Information Management, vol. 14, pp. 23-30, 2000.
-
(2000)
J. of Healthcare Information Management
, vol.14
, pp. 23-30
-
-
Noffsinger, R.1
Chin, S.2
-
3
-
-
84855308630
-
-
[Online]. Available
-
"2009 Annual Study: Global Cost of a Data Breach," 2010. [Online]. Available: http://www.securityprivacyandthelaw.com/uploads/ file/Ponemonn COBn 2009n GL.pdf
-
(2010)
2009 Annual Study: Global Cost of A Data Breach
-
-
-
4
-
-
56349121964
-
Towards the development ofprivacy-aware systems
-
P. Guarda and N. Zannone, "Towards the development ofprivacy-aware systems," Inf. Softw. Technol., vol. 51, no. 2, pp. 337-350, 2009.
-
(2009)
Inf. Softw. Technol.
, vol.51
, Issue.2
, pp. 337-350
-
-
Guarda, P.1
Zannone, N.2
-
5
-
-
0037703469
-
E-P3P privacy policies and privacy authorization
-
ACM
-
P. Ashley, S. Hada, G. Karjoth, and M. Schunter, "E-P3P privacy policies and privacy authorization," in Proc. of Workshop on Privacy in the Electronic Society. ACM, 2002, pp. 103-109.
-
(2002)
Proc. of Workshop on Privacy in the Electronic Society
, pp. 103-109
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Schunter, M.4
-
6
-
-
70350600124
-
A Formalization of HIPAA for a Medical Messaging System
-
Proc. of Int. Conf. on Trust, Privacy and Security in Digital Business, ser. Springer
-
P. E. Lam, J. C. Mitchell, and S. Sundaram, "A Formalization of HIPAA for a Medical Messaging System," in Proc. of Int. Conf. on Trust, Privacy and Security in Digital Business, ser. LNCS, vol. 5695. Springer, 2009, pp. 73-85.
-
(2009)
LNCS
, vol.5695
, pp. 73-85
-
-
Lam, P.E.1
Mitchell, J.C.2
Sundaram, S.3
-
7
-
-
77952348185
-
Usage control platformization via trustworthy SELinux
-
ACM
-
M. Alam, J.-P. Seifert, Q. Li, and X. Zhang, "Usage control platformization via trustworthy SELinux," in Proc. of ACM Symp. on Information, Computer and Communications Security. ACM, 2008, pp. 245-248.
-
(2008)
Proc. of ACM Symp. on Information, Computer and Communications Security
, pp. 245-248
-
-
Alam, M.1
Seifert, J.-P.2
Li, Q.3
Zhang, X.4
-
8
-
-
60349103393
-
Run-time enforcement ofnonsafety policies
-
J. Ligatti, L. Bauer, and D. Walker, "Run-time enforcement ofnonsafety policies," ACM Trans. Inf. Syst. Secur., vol. 12, no. 3, pp. 1-41, 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.12
, Issue.3
, pp. 1-41
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
9
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
K. W. Hamlen, G. Morrisett, and F. B. Schneider, "Computability classes for enforcement mechanisms," ACM Trans. Program. Lang. Syst., vol. 28, no. 1, pp. 175-205, 2006.
-
(2006)
ACM Trans. Program. Lang. Syst.
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.B.3
-
10
-
-
84949513306
-
Security architectures for controlled digital information dissemination
-
IEEE Computer Society
-
J. Park, R. Sandhu, and J. Schifalacqua, "Security architectures for controlled digital information dissemination," in Proc. of Annual Computer Security Applications Conf. IEEE Computer Society, 2000, pp. 224-233.
-
(2000)
Proc. of Annual Computer Security Applications Conf.
, pp. 224-233
-
-
Park, J.1
Sandhu, R.2
Schifalacqua, J.3
-
11
-
-
84881225236
-
Enforceable security policies
-
F. B. Schneider, "Enforceable security policies," ACM Trans. Inf. Syst. Secur., vol. 3, no. 1, pp. 30-50, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
12
-
-
50249144000
-
Regulating exceptions in healthcare using policy spaces
-
Proc. of Conf. on Data and Applications Security, ser. Springer
-
C. A. Ardagna, S. D. C. di Vimercati, T. Grandison, S. Jajodia, and P. Samarati, "Regulating exceptions in healthcare using policy spaces,"in Proc. of Conf. on Data and Applications Security, ser. LNCS, vol. 5094. Springer, 2008, pp. 254-267.
-
(2008)
LNCS
, vol.5094
, pp. 254-267
-
-
Ardagna, C.A.1
Di Vimercati, S.D.C.2
Grandison, T.3
Jajodia, S.4
Samarati, P.5
-
13
-
-
33947628689
-
Comprehensive management of the access to the electronic patient record: Towards trans-institutional networks
-
DOI 10.1016/j.ijmedinf.2006.09.014, PII S138650560600219X
-
C. Lovis, S. Spahni, N. Cassoni, and A. Geissbuhler, "Comprehensive management ofthe access to the electronic patient record: Towards trans-institutional networks," Int. J. of Medical Informatics, vol. 76, pp. 466-470, 2007. (Pubitemid 46498975)
-
(2007)
International Journal of Medical Informatics
, vol.76
, Issue.5-6
, pp. 466-470
-
-
Lovis, C.1
Spahni, S.2
Cassoni, N.3
Geissbuhler, A.4
-
14
-
-
35048898814
-
Privacy and utility in business processes
-
IEEE Computer Society
-
A. Barth, J. Mitchell, A. Datta, and S. Sundaram, "Privacy and utility in business processes," in Proc. of Computer Security Foundations Symp. IEEE Computer Society, 2007, pp. 279-294.
-
(2007)
Proc. of Computer Security Foundations Symp
, pp. 279-294
-
-
Barth, A.1
Mitchell, J.2
Datta, A.3
Sundaram, S.4
-
15
-
-
79551553839
-
Predictability of enforcement
-
Proc. of Int. Symp. on Engineering Secure Software and Systems, ser. Springer
-
N. Bielova and F. Massacci, "Predictability of enforcement," in Proc. of Int. Symp. on Engineering Secure Software and Systems, ser. LNCS, vol. 6542. Springer, 2011, pp. 73-86.
-
(2011)
LNCS
, vol.6542
, pp. 73-86
-
-
Bielova, N.1
Massacci, F.2
-
16
-
-
67649977014
-
Checking compliance of execution traces to business rules
-
Proc. of Workshop on Business Process Management, ser. Springer
-
F. Chesani, P. Mello, M. Montali, F. Riguzzi, M. Sebastianis, and S. Storari, "Checking compliance of execution traces to business rules,"in Proc. of Workshop on Business Process Management, ser. LNBIP, vol. 17. Springer, 2009, pp. 134-145.
-
(2009)
LNBIP
, vol.17
, pp. 134-145
-
-
Chesani, F.1
Mello, P.2
Montali, M.3
Riguzzi, F.4
Sebastianis, M.5
Storari, S.6
-
17
-
-
35748949584
-
Conformance checking of processes based on monitoring real behavior
-
DOI 10.1016/j.is.2007.07.001, PII S030643790700049X
-
A. Rozinat and W. M. P. van der Aalst, "Conformance checking ofprocesses based on monitoring real behavior," Inf. Syst., vol. 33, no. 1, pp. 64-95, 2008. (Pubitemid 350051578)
-
(2008)
Information Systems
, vol.33
, Issue.1
, pp. 64-95
-
-
Rozinat, A.1
Van Der Aalst, W.M.P.2
-
18
-
-
0038825045
-
Anomaly detection using call stack information
-
IEEE Computer Society
-
H. H. Feng, O. M. Kolesnikov, P. Fogla,W. Lee, andW. Gong, "Anomaly detection using call stack information," in Proc. of IEEE Symp. on Security and Privacy. IEEE Computer Society, 2003, pp. 62-75.
-
(2003)
Proc. of IEEE Symp. on Security and Privacy
, pp. 62-75
-
-
Feng, H.H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
19
-
-
34548805858
-
t-Closeness: Privacy Beyond k-Anonymity and l- Diversity
-
IEEE Computer Society
-
N. Li and T. Li, "t-Closeness: Privacy Beyond k-Anonymity and l- Diversity," in Proc. of IEEE Int. Conf. on Data Engineering. IEEE Computer Society, 2007, pp. 106-115.
-
(2007)
Proc. of IEEE Int. Conf. on Data Engineering
, pp. 106-115
-
-
Li, N.1
Li, T.2
-
20
-
-
33746335051
-
Differential privacy
-
Proc. of Int. Coll. on Automata, Languages and Programming, ser. Springer
-
C. Dwork, "Differential privacy," in Proc. of Int. Coll. on Automata, Languages and Programming, ser. LNCS, vol. 4052. Springer, 2006, pp. 1-12.
-
(2006)
LNCS
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
21
-
-
34249899908
-
A static analysis for quantifying information flow in a simple imperative language
-
D. Clark, S. Hunt, and P. Malacaria, "A static analysis for quantifying information flow in a simple imperative language," J. Comput. Secur., vol. 15, no. 3, pp. 321-371, 2007. (Pubitemid 46868450)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.3
, pp. 321-371
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
22
-
-
45749109040
-
Formal analysis of BPMN via a translation into COWS
-
Proc. of COORDINATION, ser. Springer
-
D. Prandi, P. Quaglia, and N. Zannone, "Formal analysis of BPMN via a translation into COWS," in Proc. of COORDINATION, ser. LNCS, vol. 5052. Springer, 2008, pp. 249-263.
-
(2008)
LNCS
, vol.5052
, pp. 249-263
-
-
Prandi, D.1
Quaglia, P.2
Zannone, N.3
-
23
-
-
33645694894
-
A semantic-based user privacy protection framework for web services
-
Proc. of Workshop on Intelligent Techniques for Web Personalization, ser. Springer
-
A. Tumer, A. Dogac, and I. H. Toroslu, "A semantic-based user privacy protection framework for web services," in Proc. of Workshop on Intelligent Techniques for Web Personalization, ser. LNCS, vol. 3169. Springer, 2003, pp. 289-305.
-
(2003)
LNCS
, vol.3169
, pp. 289-305
-
-
Tumer, A.1
Dogac, A.2
Toroslu, I.H.3
-
24
-
-
36049032185
-
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
-
F. Massacci, J. Mylopoulos, and N. Zannone, "Hierarchical hippocratic databases with minimal disclosure for virtual organizations," VLDB J., vol. 15, no. 4, pp. 370-387, 2006.
-
(2006)
VLDB J.
, vol.15
, Issue.4
, pp. 370-387
-
-
Massacci, F.1
Mylopoulos, J.2
Zannone, N.3
-
25
-
-
34547398934
-
A Combination-based Semantic Similarity Measure using Multiple Information Sources
-
IEEE Computer Society
-
H. Nguyen and H. Al-Mubaid, "A Combination-based Semantic Similarity Measure using Multiple Information Sources," in Proc. of Int. Conf. on Information Reuse and Integration. IEEE Computer Society, 2006, pp. 617-621.
-
(2006)
Proc. of Int. Conf. on Information Reuse and Integration
, pp. 617-621
-
-
Nguyen, H.1
Al-Mubaid, H.2
-
26
-
-
38949150028
-
Semantic Similarity between Concepts from Different OWL Ontologies
-
IEEE Computer Society
-
L. D. Ngan, T. M. Hang, and A. Goh, "Semantic Similarity between Concepts from Different OWL Ontologies," in Proc. of Int. Conf. on Industrial Informatics. IEEE Computer Society, 2006, pp. 618-623.
-
(2006)
Proc. of Int. Conf. on Industrial Informatics
, pp. 618-623
-
-
Ngan, L.D.1
Hang, T.M.2
Goh, A.3
-
27
-
-
84976702763
-
WordNet: Alexical database for English
-
G. A. Miller, "WordNet: alexical database for English," Commun. ACM, vol. 38, no. 11, pp. 39-41, 1995.
-
(1995)
Commun. ACM
, vol.38
, Issue.11
, pp. 39-41
-
-
Miller, G.A.1
-
28
-
-
84950419860
-
Advances inRecord-Linkage Methodology as Applied to Matching the 1985 Census of Tampa, Florida
-
M. A. Jaro, "Advances inRecord-Linkage Methodology as Applied to Matching the 1985 Census of Tampa, Florida," J. of Amer. Statistical Assoc., vol. 84, no. 406, pp. 414-420, 1989.
-
(1989)
J. of Amer. Statistical Assoc.
, vol.84
, Issue.406
, pp. 414-420
-
-
Jaro, M.A.1
-
29
-
-
0000600219
-
Solution to Plato's Problem: The Latent Semantic Analysis Theory of Acquisition, Induction and Representation of Knowledge
-
T. K. Landauer and S. T. Dumais, "Solution to Plato's Problem: The Latent Semantic Analysis Theory of Acquisition, Induction and Representation of Knowledge," Psychological Review, no. 104, 1997.
-
(1997)
Psychological Review
, Issue.104
-
-
Landauer, T.K.1
Dumais, S.T.2
-
30
-
-
0002101577
-
Reputation systems
-
P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman, "Reputation systems," Commun. ACM, vol. 43, no. 12, pp. 45-48, 2000.
-
(2000)
Commun. ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
|