Search Results - "Heurix, J"

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents by Heurix, J., Karlinger, M., Neubauer, T.

    “…The average costs of data leakage are steadily on the rise. As a consequence, several data security and access control mechanisms have been introduced, ranging…”
    Get full text
    Conference Proceeding
  2. 2

    Model-Driven Development Meets Security: An Evaluation of Current Approaches by Kasal, K, Heurix, J, Neubauer, T

    “…Although our society is critically dependent on software systems, these systems are mainly secured by protection mechanisms during operation instead of…”
    Get full text
    Conference Proceeding
  3. 3

    Data Models for the Pseudonymization of DICOM Data by Abouakil, D, Heurix, J, Neubauer, T

    “…DICOM has become the most widely implemented and supported communications standard for medical imaging. The security of DICOM relies on the encryption of the…”
    Get full text
    Conference Proceeding
  4. 4

    Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten by Neubauer, Th, Heurix, J., Min Tjoa, A, Weippl, E. R.

    Published in Elektrotechnik und Informationstechnik (01-05-2010)
    “…Zusammenfassung E-Health erlaubt eine effiziente Kommunikation zwischen Gesundheitsdiensteanbietern (GDA) und somit die bessere Verfügbarkeit medizinischer…”
    Get full text
    Journal Article
  5. 5

    Defining Secure Business Processes with Respect to Multiple Objectives by Neubauer, T., Heurix, J.

    “…Business processes are of major importance in today's business environments, and their unimpeded execution is crucial for a company's success. Since business…”
    Get full text
    Conference Proceeding
  6. 6

    Objective Types for the Valuation of Secure Business Processes by Neubauer, T., Heurix, J.

    “…In today's business environments, the unimpeded execution of corporate business processes is crucial for a company's success. As business processes are…”
    Get full text
    Conference Proceeding
  7. 7

    LiDSec- A Lightweight Pseudonymization Approach for Privacy-Preserving Publishing of Textual Personal Information by Rawassizadeh, R., Heurix, J., Khosravipour, S., Tjoa, A. M.

    “…Sharing personal information benefits both data providers and data consumers in many ways. Recent advances in sensor networks and personal archives enable…”
    Get full text
    Conference Proceeding