Sciweavers

1401 search results - page 175 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
IBERAMIA
2004
Springer
14 years 2 months ago
Dynamic Case Base Maintenance for a Case-Based Reasoning System
Abstract. The success of a case-based reasoning system depends critically on the relevance of the case base. Much current CBR research focuses on how to compact and refine the con...
Maria Salamó, Elisabet Golobardes
ASIACRYPT
2000
Springer
14 years 15 days ago
Round-Efficient Conference Key Agreement Protocols with Provable Security
A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. ...
Wen-Guey Tzeng, Zhi-Jia Tzeng
ICINCO
2004
122views Robotics» more  ICINCO 2004»
13 years 10 months ago
Data Security Considerations in Modern Automation Networks
: The automation manufacturing business has reached its turning point and manufacturers are forced to create new business areas. Their expertise about field devices will be the sou...
Mikko Salmenperä, Jari Seppälä
DEXAW
1999
IEEE
75views Database» more  DEXAW 1999»
14 years 1 months ago
Coordination of Security Levels for Internet Architectures
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Eduardo B. Fernández
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
14 years 3 months ago
Virtual Networks and Ethics: An Empirical Research in a Non-Governmental Organization
– This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical issues they raise within the transparency practices of...
Antonino Vaccaro, Peter Madsen