Learn More
The application of cryptographic transformations for the purpose of enhancing the security in data base systems is discussed. These transformations have been recognized in the past as a valuable protection mechanism but their relation to data base security has not been identified. The major reason is the lack of a suitable data base model for investigating(More)
Computational cryptography deals with the storage and processing of sensitive information in computer systems by enciphering. Sensitive information is information that for one reason or another must be protected from being disclosed to individuals without proper authorization. The need for systems to be secure from unauthorized access to sensitive(More)
A description of techniques used for semantic modeling in a deductive question-answering system is given. The system maintains a dialog and is able to understand situations which can be expressed as a series of sequential time-frames. Specific relevant questions are asked by the system when it is unable to succeed in a given task. It can also provide(More)
Present areas of application of computers to the law fall into three broad categories: (1) those involving applications of business accounting techniques such as in tax preparation and client billing, (2) those involving data management techniques such as law enforcement, criminal justice, and keyword legal source material information systems, and (3) those(More)
MRI findings of 18 examinations of six children with haemangiomatosis and one with extended arteriovenous malformation are reported. Structures involved were the liver, liver and lung, periorbital area and the thigh. Response to interferon therapy, in particular, was assessed. With MRI the disease can be characterized and the extent of the lesions and size(More)