index - Availability, Reliability and Security for Business, Enterprise and Health Information Systems
   


Full Text Documents

29

Search


Table of Contents
Availability, Reliability and Security for Business, Enterprise and Health Information Systems
A Tjoa, Gerald Quirchmayr, Ilsun You, Lida Xu
Front Matter

Conference

Multidisciplinary Research and Practice for Business, Enterprise and Health Information Systems


Benefits of Federated Identity Management - A Survey from an Integrated Operations Viewpoint
Jostein Jensen
1-12
A Security Policy Model for Agent Based Service-Oriented Architectures
Eckehard Hermann
13-25
A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting
Maria Line, Inger Tøndel, Erlend Gjære
26-37
Usage Control Enforcement - A Survey
Åsmund Nyre
38-49

Massive Information Sharing and Integration and Electronic Healthcare


Discovery and Integration of Web 2.0 Content into Geospatial Information Infrastructures: A Use Case in Wild Fire Monitoring
Manuela Núñez-Redó, Laura Díaz, José Gil, David González, Joaquín Huerta
50-68
The Problem of Conceptual Incompatibility
Simon Mcginnes
69-81
Health Care Reform and the Internet
Patricia Mactaggart, Stephanie Fiore
82-88
Integrating Patient-Related Entities Using Hospital Information System Data and Automatic Analysis of Free Text
Svetla Boytcheva, Galia Angelova, Zhivko Angelov, Dimitar Tcharaktchiev, Hristo Dimitrov
89-101
A Methodological Approach for Ontologising and Aligning Health Level Seven (HL7) Applications
Ratnesh Sahay, Ronan Fox, Antoine Zimmermann, Axel Polleres, Manfred Hauswrith
102-117
Application of Answer Set Programming for Public Health Data Integration and Analysis
Monica Nogueira, Noel Greis
118-134

Workshop

International Workshop on Security and Cognitive Informatics for Homeland Defense


Augmented Reality Approaches in Intelligent Health Technologies and Brain Lesion Detection
Tomasz Hachaj, Marek Ogiela
135-148
Hierarchical Knowledge Structure Applied to Image Analyzing System - Possibilities of Practical Usage
Krzysztof Wójcik
149-163
Evaluation of Topological Vulnerability of the Internet under Regional Failures
Wei Peng, Zimu Li, Jinshu Su, Muwei Dong
164-175
VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss
Masaya Sato, Toshihiro Yamauchi
176-190
Augmenting Surveillance System Capabilities by Exploiting Event Correlation and Distributed Attack Detection
Francesco Flammini, Nicola Mazzocca, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini
191-204
Shifting Primes: Extension of Pseudo-Mersenne Primes to Optimize ECC for MSP430-Based Future Internet of Things Devices
Leandro Marin, Antonio Jara, Antonio Skarmeta
205-219
Semantic Modelling of Coronary Vessel Structures in Computer Aided Detection of Pathological Changes
Mirosław Trzupek
220-227
Pose and Expression Recognition Using Limited Feature Points Based on a Dynamic Bayesian Network
Wei Zhao, Goo-Rak Kwon, Sang-Woong Lee
228-242
Extended Spatio-temporal Relations between Moving and Non-moving Objects
Chang Choi, Junho Choi, Juhyun Shin, Ilsun You, Pankoo Kim
243-254
A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks
Fang-Yie Leu, Yi-Fu Ciou, Yi-Li Huang
255-270
Securing Location-Aware Services Based on Online/Offline Signatures in VANETs
Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung Rhee
271-285
A Novel Secure Image Hashing Based on Reversible Watermarking for Forensic Analysis
Munkhbaatar Doyoddorj, Kyung-Hyune Rhee
286-294
Learning Web Application Firewall - Benefits and Caveats
Dariusz Pałka, Marek Zachara
295-308
A Novel Chaining Approach to Indirect Control Transfer Instructions
Wei Chen, Zhiying Wang, Qiang Dou, Yongwen Wang
309-320
A Study on Context Services Model with Location Privacy
Hoon Ko, Goreti Marreiros, Zita Vale, Jongmyung Choi
321-329
Digital Profiling: A Computer Forensics Approach
Clara Colombini, Antonio Colella
330-343
New Steganographic Techniques for the OOXML File Format
Aniello Castiglione, Bonaventura D’alessio, Alfredo Santis, Francesco Palmieri
344-358
Automated Construction of a False Digital Alibi
Alfredo Santis, Aniello Castiglione, Giuseppe Cattaneo, Giancarlo Maio, Mario Ianulardo
359-373
IT Issues on Homeland Security and Defense
Kangbin Yim, Ilsun You
374-385

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/