Sciweavers

1401 search results - page 168 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
AVBPA
2001
Springer
117views Biometrics» more  AVBPA 2001»
14 years 1 months ago
Hand Recognition Using Implicit Polynomials and Geometric Features
Person identification and verification using biometric methods is getting more and more important in today’s information society; resulting in increased utilization of systems th...
Cenker Öden, Aytül Erçil, Vedat T...
WPES
2006
ACM
14 years 2 months ago
A study on the value of location privacy
This paper introduces results of a study into the value of location privacy for individuals using mobile devices. We questioned a sample of over 1200 people from five EU countrie...
Daniel Cvrcek, Marek Kumpost, Vashek Matyas, Georg...
IEEEARES
2009
IEEE
14 years 3 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira
AAAI
1994
13 years 10 months ago
Learning to Coordinate without Sharing Information
Researchers in the eld of Distributed Arti cial Intelligence (DAI) have been developing e cient mechanisms to coordinate the activities of multiple autonomous agents. The need for...
Sandip Sen, Mahendra Sekaran, John Hale
ESOP
2003
Springer
14 years 2 months ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen