Sciweavers

1401 search results - page 171 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
LOCWEB
2009
ACM
14 years 3 months ago
Binding privacy rules to location on the web
As a tool for mitigating the potential privacy risks of gathering and transmitting location information on the Web, we suggest in this paper a model for conveying location informa...
Alissa Cooper, John Morris
FGCS
2008
159views more  FGCS 2008»
13 years 9 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
IWIA
2005
IEEE
14 years 2 months ago
Attack-Potential-Based Survivability Modeling for High-Consequence Systems
Previous quantitative models of security or survivability have been defined on a range of probable intruder behavior. This measures survivability as a statistic such as mean time...
John McDermott
IPSJ
1994
138views more  IPSJ 1994»
13 years 10 months ago
The TSIMMIS Project: Integration of Heterogeneous Information Sources
The goal of the Tsimmis Project is to develop tools that facilitate the rapid integration of heterogeneous information sources that may include both structured and unstructured da...
Sudarshan S. Chawathe, Hector Garcia-Molina, Joach...
ICPR
2006
IEEE
14 years 10 months ago
Statistical Model for the Classification of the Wavelet Transforms of T-ray Pulses
This study applies Auto Regressive (AR) and Auto Regressive Moving Average (ARMA) modeling to wavelet decomposed terahertz pulsed signals to assist biomedical diagnosis and mail/p...
Bradley Ferguson, Brian Wai-Him Ng, Derek Abbott, ...