Sciweavers

1401 search results - page 150 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
SIGSOFT
2002
ACM
14 years 9 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...
SIGCOMM
2010
ACM
13 years 9 months ago
DONAR: decentralized server selection for cloud services
Geo-replicated services need an effective way to direct client requests to a particular location, based on performance, load, and cost. This paper presents DONAR, a distributed sy...
Patrick Wendell, Joe Wenjie Jiang, Michael J. Free...
ASIASIM
2004
Springer
14 years 2 months ago
A Scalable, Ordered Scenario-Based Network Security Simulator
A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, netw...
Joo Beom Yun, Eung Ki Park, Eul-Gyu Im, Hoh Peter ...
GECCO
2010
Springer
210views Optimization» more  GECCO 2010»
14 years 1 months ago
Biogeography-based optimization of neuro-fuzzy system parameters for diagnosis of cardiac disease
Cardiomyopathy refers to diseases of the heart muscle that becomes enlarged, thick, or rigid. These changes affect the electrical stability of the myocardial cells, which in turn ...
Mirela Ovreiu, Dan Simon
CCS
2006
ACM
14 years 20 days ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof