Sciweavers

1401 search results - page 140 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
IDTRUST
2010
ACM
14 years 4 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
ESORICS
2009
Springer
14 years 1 months ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel
SUTC
2008
IEEE
14 years 4 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
BILDMED
2008
141views Algorithms» more  BILDMED 2008»
13 years 11 months ago
Analysis of Cerebral Blood Flow from Small Rodents
The exact knowledge of the blood vessel geometry plays an important role, not only in clinical applications (stroke diagnosis, detection of stenosis), but also for detailed analysi...
Monika Lehmpfuhl, Manuel André Gaudnek, And...
AAAI
1994
13 years 11 months ago
Exploiting Meta-Level information in a Distributed Scheduling System
In this paper, we study the problem of achieving efficient interaction in a distributed scheduling system whose scheduling agents may borrow resources from one another. Specifical...
Daniel E. Neiman, David W. Hildum, Victor R. Lesse...