Sciweavers

1401 search results - page 192 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
ENTCS
2007
110views more  ENTCS 2007»
13 years 8 months ago
A Bayesian Model for Event-based Trust
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternativ...
Mogens Nielsen, Karl Krukow, Vladimiro Sassone
GD
2008
Springer
13 years 10 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
SIGDOC
2009
ACM
14 years 3 months ago
Formalization and community investment in wikipedia's regulating texts: the role of essays
This poster presents ongoing research on how discursive and editing behaviors are regulated on Wikipedia by means of documented rules and practices. Our analysis focuses on three ...
Jonathan T. Morgan, Katie Derthick, Toni Ferro, El...
JNW
2008
118views more  JNW 2008»
13 years 7 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo
CCS
2010
ACM
14 years 3 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall