Sciweavers

1401 search results - page 32 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
ICIP
2006
IEEE
14 years 9 months ago
Automatic Hot Spot Detection and Segmentation in Whole Body FDG-PET Images
We present a system for automatic hot spots detection and segmentation in whole body FDG-PET images. The main contribution of our system is threefold. First, it has a novel body-s...
Haiying Guan, Toshiro Kubota, Xiaolei Huang, Xiang...
ESOP
2005
Springer
14 years 1 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
CSFW
2006
IEEE
14 years 1 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
ANSS
2008
IEEE
14 years 2 months ago
Resource Allocation Strategies in a 2-Level Hierarchical Grid System
Efficient job scheduling in grids is challenging due to the large number of distributed autonomous resources. In this paper we study various resource allocation policies in a 2-le...
Stylianos Zikos, Helen D. Karatza
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
14 years 2 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich