Sciweavers

1401 search results - page 26 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
IMCS
2007
78views more  IMCS 2007»
13 years 7 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
GECCO
2005
Springer
100views Optimization» more  GECCO 2005»
14 years 1 months ago
Genetic programming as a method to develop powerful predictive models for clinical diagnosis
In the field of medicine it is of vital importance to accurately predict the presence of a disease (diagnostic prediction) or the future occurrence of a certain event (prognostic...
Ivar Siccama, Maarten Keijzer
WPES
2003
ACM
14 years 24 days ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
CRITIS
2007
13 years 9 months ago
Modeling and Simulating Information Security Management
Security Management is a complex task. It requires several interconnected activities: designing, implementing and maintaining a robust technical infrastructure, developing suitable...
Jose Maria Sarriegi, Javier Santos, Jose M. Torres...
SACMAT
2005
ACM
14 years 1 months ago
Generalized XML security views
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [17] and later refined by Fan et al. [8]. The model consists of access control ...
Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadk...