Skip to Main content Skip to Navigation
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Availability, Reliability and Security for Business, Enterprise and Health Information Systems
A Tjoa, Gerald Quirchmayr, Ilsun You, Lida Xu
Front Matter

Conference

Multidisciplinary Research and Practice for Business, Enterprise and Health Information Systems


Benefits of Federated Identity Management - A Survey from an Integrated Operations Viewpoint
Jostein Jensen
1-12
A Security Policy Model for Agent Based Service-Oriented Architectures
Eckehard Hermann
13-25
A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting
Maria Line, Inger Tøndel, Erlend Gjære
26-37
Usage Control Enforcement - A Survey
Åsmund Nyre
38-49

Massive Information Sharing and Integration and Electronic Healthcare


Discovery and Integration of Web 2.0 Content into Geospatial Information Infrastructures: A Use Case in Wild Fire Monitoring
Manuela Núñez-Redó, Laura Díaz, José Gil, David González, Joaquín Huerta
50-68
The Problem of Conceptual Incompatibility
Simon Mcginnes
69-81
Health Care Reform and the Internet
Patricia Mactaggart, Stephanie Fiore
82-88
Integrating Patient-Related Entities Using Hospital Information System Data and Automatic Analysis of Free Text
Svetla Boytcheva, Galia Angelova, Zhivko Angelov, Dimitar Tcharaktchiev, Hristo Dimitrov
89-101
A Methodological Approach for Ontologising and Aligning Health Level Seven (HL7) Applications
Ratnesh Sahay, Ronan Fox, Antoine Zimmermann, Axel Polleres, Manfred Hauswrith
102-117
Application of Answer Set Programming for Public Health Data Integration and Analysis
Monica Nogueira, Noel Greis
118-134

Workshop

International Workshop on Security and Cognitive Informatics for Homeland Defense


Augmented Reality Approaches in Intelligent Health Technologies and Brain Lesion Detection
Tomasz Hachaj, Marek Ogiela
135-148
Hierarchical Knowledge Structure Applied to Image Analyzing System - Possibilities of Practical Usage
Krzysztof Wójcik
149-163
Evaluation of Topological Vulnerability of the Internet under Regional Failures
Wei Peng, Zimu Li, Jinshu Su, Muwei Dong
164-175
VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss
Masaya Sato, Toshihiro Yamauchi
176-190
Augmenting Surveillance System Capabilities by Exploiting Event Correlation and Distributed Attack Detection
Francesco Flammini, Nicola Mazzocca, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini
191-204
Shifting Primes: Extension of Pseudo-Mersenne Primes to Optimize ECC for MSP430-Based Future Internet of Things Devices
Leandro Marin, Antonio Jara, Antonio Skarmeta
205-219
Semantic Modelling of Coronary Vessel Structures in Computer Aided Detection of Pathological Changes
Mirosław Trzupek
220-227
Pose and Expression Recognition Using Limited Feature Points Based on a Dynamic Bayesian Network
Wei Zhao, Goo-Rak Kwon, Sang-Woong Lee
228-242
Extended Spatio-temporal Relations between Moving and Non-moving Objects
Chang Choi, Junho Choi, Juhyun Shin, Ilsun You, Pankoo Kim
243-254
A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks
Fang-Yie Leu, Yi-Fu Ciou, Yi-Li Huang
255-270
Securing Location-Aware Services Based on Online/Offline Signatures in VANETs
Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung Rhee
271-285
A Novel Secure Image Hashing Based on Reversible Watermarking for Forensic Analysis
Munkhbaatar Doyoddorj, Kyung-Hyune Rhee
286-294
Learning Web Application Firewall - Benefits and Caveats
Dariusz Pałka, Marek Zachara
295-308
A Novel Chaining Approach to Indirect Control Transfer Instructions
Wei Chen, Zhiying Wang, Qiang Dou, Yongwen Wang
309-320
A Study on Context Services Model with Location Privacy
Hoon Ko, Goreti Marreiros, Zita Vale, Jongmyung Choi
321-329
Digital Profiling: A Computer Forensics Approach
Clara Colombini, Antonio Colella
330-343
New Steganographic Techniques for the OOXML File Format
Aniello Castiglione, Bonaventura D’alessio, Alfredo Santis, Francesco Palmieri
344-358
Automated Construction of a False Digital Alibi
Alfredo Santis, Aniello Castiglione, Giuseppe Cattaneo, Giancarlo Maio, Mario Ianulardo
359-373
IT Issues on Homeland Security and Defense
Kangbin Yim, Ilsun You
374-385

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/