Sciweavers

1401 search results - page 131 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
SIGOPS
2010
84views more  SIGOPS 2010»
13 years 7 months ago
LazyBase: freshness vs. performance in information management
Information management applications exhibit a wide range of query performance and result freshness goals. Some applications, such as web search, require interactive performance, b...
Kimberly Keeton, Charles B. Morrey III, Craig A. N...
JAMIA
2011
94views more  JAMIA 2011»
13 years 4 months ago
Challenges in ethics, safety, best practices, and oversight regarding HIT vendors, their customers, and patients: a report of an
The current commercial health information technology (HIT) arena encompasses a number of competing firms that provide electronic health applications to hospitals, clinical practi...
Kenneth W. Goodman, Eta S. Berner, Mark A. Dente, ...
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
An ECA-P Policy-based Framework for Managing Ubiquitous Computing Environments
Ubiquitous Computing Environments feature massively distributed systems containing a large number of devices, services and applications that help end-users perform various kinds o...
Chetan Shiva Shankar, Anand Ranganathan, Roy H. Ca...
SAC
2010
ACM
14 years 3 months ago
Towards fine-grained and application-centric access control for wireless sensor networks
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of fine-grained securi...
Nelson Matthys, Syed Rehan Afzal, Christophe Huyge...
RBAC
1997
135views more  RBAC 1997»
13 years 10 months ago
Reconciling role based management and role based access control
Role Based Access Control is only a subset of the security management and distributed systems management. Yet, the characteristics and use of the role objects in RBAC or Role Base...
Emil Lupu, Morris Sloman