Sciweavers

1401 search results - page 162 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
IEEEIAS
2009
IEEE
14 years 3 months ago
Organizational Barriers to the Implementation of Security Engineering
: The link between security engineering and systems engineering exists at the earliest stage of systems development, and, as a whole, there is sufficient evidence to suggest the di...
Bryan Stewart Cline
CIKM
2000
Springer
14 years 1 months ago
A Framework for Modeling Buffer Replacement Strategies
An e ective bu er management system is crucial for any database management system. While much work has been expended to provide extensible data types,extensible query languages an...
Stéphane Bressan, Chong Leng Goh, Beng Chin...
ISI
2006
Springer
13 years 9 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
WISEC
2010
ACM
13 years 9 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
ACMDIS
2004
ACM
14 years 2 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...