Sciweavers

1401 search results - page 103 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
HASKELL
2008
ACM
13 years 10 months ago
A library for light-weight information-flow security in haskell
Protecting confidentiality of data has become increasingly important for computing systems. Information-flow techniques have been developed over the years to achieve that purpos...
Alejandro Russo, Koen Claessen, John Hughes
ICWS
2007
IEEE
13 years 10 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...
CCS
2006
ACM
14 years 21 days ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
ISEMANTICS
2010
13 years 10 months ago
SESAME demonstrator: ontologies, services and policies for energy efficiency
The project SESAME uses semantic modeling and reasoning to support home owners and building managers in saving energy and in optimizing their energy costs while maintaining their ...
Slobodanka Tomic, Anna Fensel, Tassilo Pellegrini
SACMAT
2009
ACM
14 years 3 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....