Table of Contents
|
Availability, Reliability and Security for Business, Enterprise and Health Information Systems A Tjoa, Gerald Quirchmayr, Ilsun You, Lida Xu |
Front Matter |
Conference
Multidisciplinary Research and Practice for Business, Enterprise and Health Information Systems
|
Benefits of Federated Identity Management - A Survey from an Integrated Operations Viewpoint Jostein Jensen |
1-12 |
A Security Policy Model for Agent Based Service-Oriented Architectures Eckehard Hermann |
13-25 |
A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting Maria Line, Inger Tøndel, Erlend Gjære |
26-37 |
Usage Control Enforcement - A Survey Åsmund Nyre |
38-49 |
Massive Information Sharing and Integration and Electronic Healthcare
|
Discovery and Integration of Web 2.0 Content into Geospatial Information Infrastructures: A Use Case in Wild Fire Monitoring Manuela Núñez-Redó, Laura Díaz, José Gil, David González, Joaquín Huerta |
50-68 |
The Problem of Conceptual Incompatibility Simon Mcginnes |
69-81 |
Health Care Reform and the Internet Patricia Mactaggart, Stephanie Fiore |
82-88 |
Integrating Patient-Related Entities Using Hospital Information System Data and Automatic Analysis of Free Text Svetla Boytcheva, Galia Angelova, Zhivko Angelov, Dimitar Tcharaktchiev, Hristo Dimitrov |
89-101 |
A Methodological Approach for Ontologising and Aligning Health Level Seven (HL7) Applications Ratnesh Sahay, Ronan Fox, Antoine Zimmermann, Axel Polleres, Manfred Hauswrith |
102-117 |
Application of Answer Set Programming for Public Health Data Integration and Analysis Monica Nogueira, Noel Greis |
118-134 |
Workshop
International Workshop on Security and Cognitive Informatics for Homeland Defense
|
Augmented Reality Approaches in Intelligent Health Technologies and Brain Lesion Detection Tomasz Hachaj, Marek Ogiela |
135-148 |
Hierarchical Knowledge Structure Applied to Image Analyzing System - Possibilities of Practical Usage Krzysztof Wójcik |
149-163 |
Evaluation of Topological Vulnerability of the Internet under Regional Failures Wei Peng, Zimu Li, Jinshu Su, Muwei Dong |
164-175 |
VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss Masaya Sato, Toshihiro Yamauchi |
176-190 |
Augmenting Surveillance System Capabilities by Exploiting Event Correlation and Distributed Attack Detection Francesco Flammini, Nicola Mazzocca, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini |
191-204 |
Shifting Primes: Extension of Pseudo-Mersenne Primes to Optimize ECC for MSP430-Based Future Internet of Things Devices Leandro Marin, Antonio Jara, Antonio Skarmeta |
205-219 |
Semantic Modelling of Coronary Vessel Structures in Computer Aided Detection of Pathological Changes Mirosław Trzupek |
220-227 |
Pose and Expression Recognition Using Limited Feature Points Based on a Dynamic Bayesian Network Wei Zhao, Goo-Rak Kwon, Sang-Woong Lee |
228-242 |
Extended Spatio-temporal Relations between Moving and Non-moving Objects Chang Choi, Junho Choi, Juhyun Shin, Ilsun You, Pankoo Kim |
243-254 |
A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks Fang-Yie Leu, Yi-Fu Ciou, Yi-Li Huang |
255-270 |
Securing Location-Aware Services Based on Online/Offline Signatures in VANETs Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung Rhee |
271-285 |
A Novel Secure Image Hashing Based on Reversible Watermarking for Forensic Analysis Munkhbaatar Doyoddorj, Kyung-Hyune Rhee |
286-294 |
Learning Web Application Firewall - Benefits and Caveats Dariusz Pałka, Marek Zachara |
295-308 |
A Novel Chaining Approach to Indirect Control Transfer Instructions Wei Chen, Zhiying Wang, Qiang Dou, Yongwen Wang |
309-320 |
A Study on Context Services Model with Location Privacy Hoon Ko, Goreti Marreiros, Zita Vale, Jongmyung Choi |
321-329 |
Digital Profiling: A Computer Forensics Approach Clara Colombini, Antonio Colella |
330-343 |
New Steganographic Techniques for the OOXML File Format Aniello Castiglione, Bonaventura D’alessio, Alfredo Santis, Francesco Palmieri |
344-358 |
Automated Construction of a False Digital Alibi Alfredo Santis, Aniello Castiglione, Giuseppe Cattaneo, Giancarlo Maio, Mario Ianulardo |
359-373 |
IT Issues on Homeland Security and Defense Kangbin Yim, Ilsun You |
374-385 |