Sciweavers

1401 search results - page 24 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
ISW
1997
Springer
13 years 11 months ago
A Framework for the Management of Information Security
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Jussipekka Leiwo, Yuliang Zheng
AUIC
2000
IEEE
13 years 12 months ago
Supporting Special-Purpose Health Care Models via Web Interfaces
The potential of the Web, via both the Internet and intranets, to facilitate development of clinical information systems has been evident for some time. Most Web-based clinical wo...
James R. Warren, Heath K. Frankel, Joseph T. Noone...
MIDDLEWARE
2004
Springer
14 years 27 days ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
ESORICS
2007
Springer
14 years 1 months ago
What, Indeed, Is Intransitive Noninterference?
Abstract. This paper argues that Haigh and Young’s definition of noninterference for intransitive security policies admits information flows that are not in accordance with the...
Ron van der Meyden
ENTCS
2008
136views more  ENTCS 2008»
13 years 7 months ago
A Virtual Machine Based Information Flow Control System for Policy Enforcement
The ability to enforce usage policies attached to data in a fine grained manner requires that the system be able to trace and control the flow of information within it. This paper...
Srijith Krishnan Nair, Patrick N. D. Simpson, Brun...