Sciweavers

1401 search results - page 104 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
14 years 29 days ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
SPW
1999
Springer
14 years 1 months ago
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate the principal security issues f...
Frank Stajano, Ross J. Anderson
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 3 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
14 years 2 months ago
Storage Model for CDA Documents
The Health Level 7 Clinic Document Architecture (CDA) is an XML-based document markup standard that specifies the hierarchical structure and semantics of “clinical documents” ...
Zheng Liang, Peter Bodorik, Michael Shepher
INFOCOM
2003
IEEE
14 years 2 months ago
Exploiting Wireless Channel State Information for Throughput Maximization
— We consider the problem of scheduling packets over a number of channels with time varying connectivity. Policies proposed for this problem either stabilize the system when the ...
Vagelis Tsibonis, Leonidas Georgiadis, Leandros Ta...