Sciweavers

653 search results - page 113 / 131
» A Logic of Secure Systems and its Application to Trusted Com...
Sort
View
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
14 years 20 days ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...
DATESO
2010
150views Database» more  DATESO 2010»
13 years 5 months ago
Evolving Quasigroups by Genetic Algorithms
Abstract. Quasigroups are a well-known combinatorial design equivalent to more familiar Latin squares. Because all possible elements of a quasigroup occur with equal probability, i...
Václav Snásel, Jiri Dvorský, ...
CCS
2005
ACM
14 years 1 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
MAGS
2008
169views more  MAGS 2008»
13 years 7 months ago
ACVisualizer: A visualization tool for APi-calculus
Process calculi are mathematical tools used for modeling and analyzing the structure and behavior of reactive systems. One such calculus, called APi-calculus (an extension to Pi-ca...
Raheel Ahmad, Shahram Rahimi
EDOC
2006
IEEE
14 years 1 months ago
VIDRE - A Distributed Service-Oriented Business Rule Engine based on RuleML
Business rules provide an elegant solution to manage dynamic business logic by separating business knowledge from its implementation logic. The drawback of most existing business ...
Christoph Nagl, Florian Rosenberg, Schahram Dustda...