Sciweavers

346 search results - page 21 / 70
» A Privacy Policy Model for Enterprises
Sort
View
EDOC
2009
IEEE
14 years 2 months ago
Modelling and Reasoning Languages for Social Networks Policies
—Policy languages (such as privacy and rights) have had little impact on the wider community. Now that Social Networks have taken off, the need to revisit Policy languages and re...
Guido Governatori, Renato Iannella
ACSAC
2004
IEEE
13 years 11 months ago
Visualizing Enterprise-Wide Security (VIEWS)
This paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. The authors' recent experience with providing security archi...
J. J. Brennan, Mindy Rudell, Donald B. Faatz, Cars...
IJMI
2007
140views more  IJMI 2007»
13 years 7 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
ICASSP
2011
IEEE
12 years 11 months ago
Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage
A rechargeable battery may be used to partially protect the privacy of information contained in a household’s electrical load profile. We represent the system as a finite stat...
David P. Varodayan, Ashish Khisti
ESORICS
2002
Springer
14 years 7 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti