Search Results - "Heurix, Johannes"
-
1
Nachhaltige Digitale Zwillinge in der Landwirtschaft
Published in Zeitschrift für Hochschulentwicklung (05-02-2024)“…Die Digitalisierung vollzieht sich auch in der Landwirtschaft in rasanter Geschwindigkeit. Die erheblichen Risiken bei der Anwendung von Lösungen, die in ihren…”
Get full text
Journal Article -
2
A methodology for the pseudonymization of medical data
Published in International journal of medical informatics (Shannon, Ireland) (01-03-2011)“…Abstract Purpose E-health enables the sharing of patient-related data whenever and wherever necessary. Electronic health records (EHRs) promise to improve…”
Get full text
Journal Article -
3
A taxonomy for privacy enhancing technologies
Published in Computers & security (01-09-2015)“…Privacy-enhancing technologies (PETs) belong to a class of technical measures which aim at preserving the privacy of individuals or groups of individuals…”
Get full text
Journal Article -
4
AI- and data-driven pre-crop values and crop rotation matrices
Published in European journal of agronomy (01-10-2023)“…Crop rotation planning, being an essential prerequisite for organic farming, involves determining the species and timing of crops on farmland to improve soil…”
Get full text
Journal Article -
5
Recognition and pseudonymisation of medical records for secondary use
Published in Medical & biological engineering & computing (01-03-2016)“…Health records rank among the most sensitive personal information existing today. An unwanted disclosure to unauthorised parties usually results in significant…”
Get full text
Journal Article -
6
De-identification of unstructured paper-based health records for privacy-preserving secondary use
Published in Journal of medical engineering & technology (01-07-2014)“…Abstract Whenever personal data is processed, privacy is a serious issue. Especially in the document-centric e-health area, the patients' privacy must be…”
Get full text
Journal Article -
7
Recognition and privacy preservation of paper-based health records
Published in Studies in health technology and informatics (2012)“…While the digitization of medical data within electronic health records has been introduced in some areas, massive amounts of paper-based health records are…”
Get more information
Journal Article -
8
Current challenges in information security risk management
Published in Information management & computer security (10-11-2014)“…Purpose – The purpose of this paper is to give an overview of current risk management approaches and outline their commonalities and differences, evaluate…”
Get full text
Journal Article -
9
A rule-based transformation system for converting semi-structured medical documents
Published in Health and technology (01-03-2013)“…The electronic health record (EHR) enabled the cost-efficient handling and processing of health information. By storing medical documents in digitized form,…”
Get full text
Journal Article -
10
Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents
Published in 2012 45th Hawaii International Conference on System Sciences (01-01-2012)“…The average costs of data leakage are steadily on the rise. As a consequence, several data security and access control mechanisms have been introduced, ranging…”
Get full text
Conference Proceeding -
11
Model-Driven Development Meets Security: An Evaluation of Current Approaches
Published in 2011 44th Hawaii International Conference on System Sciences (01-01-2011)“…Although our society is critically dependent on software systems, these systems are mainly secured by protection mechanisms during operation instead of…”
Get full text
Conference Proceeding -
12
Data Models for the Pseudonymization of DICOM Data
Published in 2011 44th Hawaii International Conference on System Sciences (01-01-2011)“…DICOM has become the most widely implemented and supported communications standard for medical imaging. The security of DICOM relies on the encryption of the…”
Get full text
Conference Proceeding -
13
A Roadmap for Personal Identity Management
Published in 2010 Fifth International Conference on Systems (01-04-2010)“…Digital identities and secure environments are a fundamental precondition for giving life to e-government, e-health, and e-commerce. Whereas corporations are…”
Get full text
Conference Proceeding -
14
On the Security of Outsourced and Untrusted Databases
Published in 2010 IEEE/ACIS 9th International Conference on Computer and Information Science (01-08-2010)“…The outsourcing of databases to third parties has become a viable alternative to traditional in-house data management. Database management by third parties…”
Get full text
Conference Proceeding -
15
SEMERGY.net: automatically identifying and optimizing energy-efficient building designs: Status quo and outlook
Published in Computer science (Berlin, Germany) (01-08-2016)“…A central goal of European and national climate and energy programs is to reduce the greenhouse gas emission of buildings. SEMERGY is a web-based optimization…”
Get full text
Journal Article -
16
Defining Secure Business Processes with Respect to Multiple Objectives
Published in 2008 Third International Conference on Availability, Reliability and Security (01-03-2008)“…Business processes are of major importance in today's business environments, and their unimpeded execution is crucial for a company's success. Since business…”
Get full text
Conference Proceeding -
17
Objective Types for the Valuation of Secure Business Processes
Published in Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008) (01-05-2008)“…In today's business environments, the unimpeded execution of corporate business processes is crucial for a company's success. As business processes are…”
Get full text
Conference Proceeding -
18
Message from the IWSMA Workshop Organizers
Published in 2012 Seventh International Conference on Availability, Reliability and Security (01-08-2012)“…Presents the welcome message from the conference proceedings…”
Get full text
Conference Proceeding -
19
LiDSec- A Lightweight Pseudonymization Approach for Privacy-Preserving Publishing of Textual Personal Information
Published in 2011 Sixth International Conference on Availability, Reliability and Security (01-08-2011)“…Sharing personal information benefits both data providers and data consumers in many ways. Recent advances in sensor networks and personal archives enable…”
Get full text
Conference Proceeding