Sciweavers

224 search results - page 8 / 45
» A General Methodology For The Development Of An Effective In...
Sort
View
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
14 years 1 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke
PLDI
2005
ACM
14 years 1 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
OOPSLA
2007
Springer
14 years 1 months ago
A framework for distributed collaborative conceptual model development
One of the major concerns in the processes which involve human analysts is the existence of uncertainty/inconsistency. In this paper, we propose a model based on belief theory tha...
Ebrahim Bagheri, Ali A. Ghorbani
ICSE
2008
IEEE-ACM
14 years 8 months ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb
SOUPS
2009
ACM
14 years 2 months ago
A "nutrition label" for privacy
We used an iterative design process to develop a privacy label that presents to consumers the ways organizations collect, use, and share personal information. Many surveys have sh...
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith C...