Sciweavers

1401 search results - page 57 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
IADIS
2003
13 years 10 months ago
Integrating RBAC Mechanisms in a Web Server
Hypermedia systems (whether web sites or not) should support multilevel policiesm, offering different views and manipulation abilities of the same information to users with differ...
Daniel Sanz-García, Paloma Díaz, Ign...
CCS
2008
ACM
13 years 10 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
JUCS
2006
113views more  JUCS 2006»
13 years 8 months ago
A Collaborative Biomedical Research System
: The convergence of need between improved clinical care and post genomics research presents a unique challenge to restructuring information flow so that it benefits both without c...
Adel Taweel, Alan L. Rector, Jeremy Rogers
JHSN
2006
267views more  JHSN 2006»
13 years 8 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
CCS
2010
ACM
14 years 3 months ago
Toward practical authorization-dependent user obligation systems
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...