Sciweavers

1401 search results - page 121 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
CAI
2000
Springer
13 years 8 months ago
Schema Evolution in Software Engineering Databases - a New Approach in Adele Environment
Abstract. This paper discusses schema evolution in software engineering databases. After a study of existing approaches, we show that these approaches do not satisfy software engin...
Mohamed Ahmed-Nacer, Jacky Estublier
SRDS
2010
IEEE
13 years 6 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
IJNSEC
2006
112views more  IJNSEC 2006»
13 years 9 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao
IOR
2002
88views more  IOR 2002»
13 years 8 months ago
An Adaptive Bayesian Replacement Policy with Minimal Repair
In this study, an adaptive Bayesian decision model is developed to determine the optimal replacement age for the systems maintained according to a general age replacement policy. I...
Savas Dayanik, Ülkü Gürler
SP
2006
IEEE
110views Security Privacy» more  SP 2006»
14 years 3 months ago
Privacy and Contextual Integrity: Framework and Applications
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...