Sciweavers

1401 search results - page 156 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
CSREASAM
2006
13 years 10 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
ICCCI
2010
Springer
13 years 7 months ago
Strategic Health Information Management and Forecast: The Birdwatching Approach
Abstract. To facilitate communication and the exchange of information between patients, nurses, lab technicians, health insurers, physicians, policy makers, and existing knowledge-...
Arash Shaban-Nejad, Volker Haarslev
DIM
2005
ACM
13 years 11 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
JCS
2002
103views more  JCS 2002»
13 years 8 months ago
Toward Cost-Sensitive Modeling for Intrusion Detection and Response
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion...
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. S...
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
14 years 1 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....