No abstract available.
Developing CIMA-based cyberinfrastructure for remote access to scientific instruments and collaborative e-research
- Ian M. Atkinson,
- Douglas du Boulay,
- Clinton Chee,
- Kenneth Chiu,
- Paul Coddington,
- Andrea Gerson,
- Tristan King,
- Donald F. McMullen,
- Romain Quilici,
- Peter Turner,
- Andrew Wendelborn,
- Mathew Wyatt,
- Donglai Zhang
An infrastructure for remote instrument access, data acquisition and data management is being developed for e-Research. The Common Instrument Middleware Architecture (CIMA) is being used to provide a scalable and extensible basis for the ...
A grid based e-research platform for clinical management in the human respiratory and vascular system
A Grid based e-Research platform is being developed for providing a simulation-based virtual reality environment for clinical management and therapy treatment. The development of this platform involves cross-disciplinary experts aiming at combining the ...
Service oriented grid architecture for geosciences community
Grid computing has many attributes that provide benefits to research communities. These include the ability to do existing research faster; enable collaborative environments; reduce costs and provide a pool of resources that creates an ability to ...
Securing grid data using mandatory access controls
The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MACs), namely those provided by SELinux, to secure application-level data. Particular emphasis is placed on health-care records located on the grid. The ...
Communication network analysis of the enterprise grid systems
This paper addresses the problem of performance analysis based on communication modelling of large-scale heterogeneous distributed systems with emphases on enterprise grid computing systems. The study of communication layers is important because the ...
DGRID: a DHT-based resource indexing and discovery scheme for computational grids
Traditional DHT (Distributed Hash Tables) abstraction distributes data items among peer nodes on a structured overlay network. This introduces a number of issues when nodes are under different administrative authorities. In this paper, we propose DGRID, ...
Autonomic system management in mobile grid environments
Mobile device integration in grid environments is a challenge for many researchers. Due to the transient nature of mobile devices, service management is a critical, but often overlooked area of research. We propose a distributed broker responsible for ...
The semantic reef: managing complex knowledge to predict coral bleaching on the great barrier reef
A semantically driven Virtual Organisation (VO) model for predicting important events for coral reefs is presented - the Semantic Reef. The model is an application of a Semantic Grid that encapsulates services and resources to produce a complex higher-...
Storage and data management in EGEE
Distributed management of data is one of the most important problems facing grids. Within the Enabling Grids for Enabling eScience (EGEE) project, currently the world's largest production grid, a sophisticated hierarchy of data management and storage ...
YourSRB: a cross platform interface for SRB and digital libraries
Many large scale research programs with massive data requirements (e.g. the Particle Physics Data Grid, the Biomedical Informatics Research Network) use SRB to manage research data collections. Despite this broad adoption, the potential of SRB and Data ...
Security of statistical databases: overview and future directions
A statistical database is a database in which the only queries allowed are of statistical type, and based on aggregate data. In particular, a statistical database is not supposed to give answers to queries pertaining to single individual records.
...
Spelling-error tolerant, order-independent pass-phrases via the damerau-levenshtein string-edit distance metric
It is well understood that passwords must be very long and complex to have sufficient entropy for security purposes. Unfortunately, these passwords tend to be hard to memorize, and so alternatives are sought. Smart Cards, Biometrics, and Reverse Turing ...
A privacy enhancing mechanism based on pseudonyms for identity protection in location-based services
Over the past years Mobile Business has gained significant progress not only because of higher transfer rates as well as advanced processing power and memory capabilities of networks and mobile devices but also because of novel location-based mobile ...
Usability and privacy in identity management architectures
Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to in an increasing number of different identities that each user needs to manage. As a result, many ...
Isogeny cordillera algorithm to obtain cryptographically good elliptic curves
The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Such a problem turns out to be computationally unfeasible when elliptic curves are suitably chosen. This paper ...
A range test secure in the active adversary model
In ACISP 2006, Peng et al proposed a novel range test technique, which tests whether the integer encrypted in a ciphertext is in an interval range. Their solution is more efficient than any previous solution to range test. However, their technique only ...
The motivation and proposition of a privacy-enhancing architecture for operational databases
To date, research has focussed on privacy from a wide perspective, enabling organisations to implement various technologies that contribute to privacy protection. However, in such approaches the perspective of the data subject is often obscured in ...
Design principles for low latency anonymous network systems secure against timing attacks
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model the adversary can only see part of the links in the system. In a recent ...
Controlling inference: avoiding p-level reduction during analysis
This paper presents a concept hierarchy-based approach to privacy preserving data collection for data mining called the P-level model. The P-level model allows data providers to divulge information at any chosen privacy level (P-level), on any ...
Take heart II: a modular bayesian decision support system
Bayesian networks are a powerful technology for decision support systems. They provide a flexible platform for modeling expert knowledge and benefit from a wide range of machine learning techniques for building models from data; we can also integrate ...
An interactive knowledge-based learning environment for transferring health knowledge
This paper describes a narrative based interactive intelligent learning environment which aims to elucidate reasoning using interactive scenarios that may be used in training novices ICU nurses in the application of their knowledge and decision making. ...
Hospital management knowledge discovery using discrete event simulation
This paper describes research into one of the key areas of knowledge in healthcare. That is, the knowledge base of hospital managers in relation to access, demand and resource management in hospitals. The latter are ongoing problems which impact on ...
An automated system for conversion of clinical notes into SNOMED clinical terminology
The automatic conversion of free text into a medical ontology can allow computational access to important information currently locked within clinical notes and patient reports. This system introduces a new method for automatically identifying medical ...
A data warehouse architecture for clinical data warehousing
Data warehousing methodologies share a common set of tasks, including business requirements analysis, data design, architectural design, implementation and deployment. Clinical data warehouses are complex and time consuming to review a series of patient ...
Determining pattern element contribution in medical datasets
Presented are two novel solutions addressing issues in the application of automated data analysis techniques in the medical domain. The primary aim of our work is to provide medical practitioners with patterns which can inform, and facilitate the ...
Extracting semantics in a clinical scenario
Unlike abstracts, full articles of clinical case studies provide more detailed profiles of a patient, such as signs and symptoms, and important laboratory test results of the patient from the diagnostic and treatment procedures. This paper proposes a ...


