Sciweavers

1401 search results - page 64 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
14 years 1 months ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
ESORICS
2006
Springer
14 years 15 days ago
Timing-Sensitive Information Flow Analysis for Synchronous Systems
Timing side channels are a serious threat to the security of cryptographic algorithms. This paper presents a novel method for the timing-sensitive analysis of information flow in s...
Boris Köpf, David A. Basin
CEEMAS
2007
Springer
14 years 3 months ago
HeCaSe2: A Multi-agent Ontology-Driven Guideline Enactment Engine
Abstract. HeCaSe2 is a multi-agent system that intends to help doctors to apply clinical guidelines to their patients in a semi-automatic fashion. HeCaSe2 agents need a lot of (sca...
David Isern, David Sánchez, Antonio Moreno
CSFW
2007
IEEE
14 years 24 days ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
FAST
2009
13 years 6 months ago
Towards Semantics for Provenance Security
Provenance records the history of data. Careless use of provenance may violate the security policies of data. Moreover, the provenance itself may be sensitive information, necessi...
Stephen Chong