Search Results - "Heurix, J"
-
1
Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents
Published in 2012 45th Hawaii International Conference on System Sciences (01-01-2012)“…The average costs of data leakage are steadily on the rise. As a consequence, several data security and access control mechanisms have been introduced, ranging…”
Get full text
Conference Proceeding -
2
Model-Driven Development Meets Security: An Evaluation of Current Approaches
Published in 2011 44th Hawaii International Conference on System Sciences (01-01-2011)“…Although our society is critically dependent on software systems, these systems are mainly secured by protection mechanisms during operation instead of…”
Get full text
Conference Proceeding -
3
Data Models for the Pseudonymization of DICOM Data
Published in 2011 44th Hawaii International Conference on System Sciences (01-01-2011)“…DICOM has become the most widely implemented and supported communications standard for medical imaging. The security of DICOM relies on the encryption of the…”
Get full text
Conference Proceeding -
4
Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten
Published in Elektrotechnik und Informationstechnik (01-05-2010)“…Zusammenfassung E-Health erlaubt eine effiziente Kommunikation zwischen Gesundheitsdiensteanbietern (GDA) und somit die bessere Verfügbarkeit medizinischer…”
Get full text
Journal Article -
5
Defining Secure Business Processes with Respect to Multiple Objectives
Published in 2008 Third International Conference on Availability, Reliability and Security (01-03-2008)“…Business processes are of major importance in today's business environments, and their unimpeded execution is crucial for a company's success. Since business…”
Get full text
Conference Proceeding -
6
Objective Types for the Valuation of Secure Business Processes
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…In today's business environments, the unimpeded execution of corporate business processes is crucial for a company's success. As business processes are…”
Get full text
Conference Proceeding -
7
LiDSec- A Lightweight Pseudonymization Approach for Privacy-Preserving Publishing of Textual Personal Information
Published in 2011 Sixth International Conference on Availability, Reliability and Security (01-08-2011)“…Sharing personal information benefits both data providers and data consumers in many ways. Recent advances in sensor networks and personal archives enable…”
Get full text
Conference Proceeding