Sciweavers

1401 search results - page 69 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
IEEESP
2011
13 years 9 days ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
IH
1998
Springer
14 years 1 months ago
Modeling the Security of Steganographic Systems
Jan Zöllner, Hannes Federrath, Herbert Kliman...
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
14 years 1 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
NSPW
1998
ACM
14 years 1 months ago
Meta Objects for Access Control: a Formal Model for Role-Based Principals
Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming models. In object-based systems access control is often...
Thomas Riechmann, Franz J. Hauck
IASTEDSEA
2004
13 years 10 months ago
Modeling and analyzing security protocols in SAM: A case study
: Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use S...
Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao