Sciweavers

1401 search results - page 252 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
DIM
2005
ACM
13 years 10 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 11 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
CORR
2010
Springer
206views Education» more  CORR 2010»
13 years 8 months ago
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
Abstract. Artificial immune systems (AISs) are problem-solving systems inspired by the biological immune system. They have been successfully applied to a number of problem domains ...
Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook
HICSS
2007
IEEE
144views Biometrics» more  HICSS 2007»
14 years 3 months ago
The Indicator Browser: A Web-Based Interface for Visualizing UrbanSim Simulation Results
Abstract— UrbanSim is a large scale land use and transportation simulator that models the possible long-term effects of different policies on urban regions. The output is present...
Yael Schwartzman, Alan Borning
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 8 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy