Sciweavers

1401 search results - page 31 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
PPDP
2005
Springer
14 years 1 months ago
Security policy in a declarative style
We address the problem of controlling information leakage in a concurrent declarative programming setting. Our aim is to define verification tools in order to distinguish betwee...
Rachid Echahed, Frédéric Prost
CSFW
2012
IEEE
11 years 10 months ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
CCIA
2007
Springer
14 years 1 months ago
Agents and Clinical Guidelines: Filling the Semantic Gap
Medical ontologies are developed to solve problems such as the demand for reusing, sharing and transmitting data. The unambiguous communication of complex and detailed medical conc...
David Isern, David Sánchez, Antonio Moreno
SACMAT
2010
ACM
14 years 11 days ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
POPL
2005
ACM
14 years 7 months ago
Downgrading policies and relaxed noninterference
In traditional information-flow type systems, the security policy is often formalized as noninterference properties. However, noninterference alone is too strong to express securi...
Peng Li, Steve Zdancewic