Sciweavers

1401 search results - page 204 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
HPDC
1998
IEEE
14 years 1 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman
ACNS
2004
Springer
128views Cryptology» more  ACNS 2004»
14 years 2 months ago
A Novel Framework for Alert Correlation and Understanding
Abstract. We propose a novel framework named Hidden Colored PetriNet for Alert Correlation and Understanding (HCPN-ACU) in intrusion detection system. This model is based upon the ...
Dong Yu, Deborah A. Frincke
SPC
2005
Springer
14 years 2 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
AICT
2006
IEEE
14 years 16 days ago
Classification of service for entertainment applications in vehicles
Generally, the real-time applications exchange information on dedicated network and the other traffic is supported by another communication system. The differentiation of these tw...
Jean-Philippe Georges, Eric Rondeau, Thierry Divou...
IWANN
2007
Springer
14 years 2 months ago
Towards the Integration of a Bioprofile in Ocular Melanoma
Approximately 50% of all patients with intraocular melanoma die of metastatic disease, despite successful treatment of the primary tumour. The main factors associated with mortalit...
Azzam F. Taktak, Antonio Eleuteri, Christian Setzk...