Sciweavers

1401 search results - page 145 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
AOIS
2003
13 years 10 months ago
I-MINDS: An Agent-Oriented Information System for Applications in Education
Abstract. In this paper, we describe an Intelligent Multiagent Infrastructure for Distributed Systems in Education (or I-MINDS) framework that applies an agent-oriented information...
Leen-Kiat Soh, Xuli Liu, XueSong Zhang, Jameela Al...
SOUPS
2010
ACM
14 years 25 days ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
SSR
2001
104views more  SSR 2001»
13 years 10 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
HICSS
2008
IEEE
147views Biometrics» more  HICSS 2008»
14 years 3 months ago
Exploring Barriers to Innovation Diffusion in Health Care Service Organizations: An Issue for Effective Integration of Service A
- This study explores the diffusion of innovations in health care service organizations. The importance of the diffusion arises from the direct effect of innovations on the quality...
Tugrul U. Daim, R. Tarcan Tarman, Nuri Basoglu
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw