Sciweavers

1401 search results - page 6 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
MODELLIERUNG
2008
13 years 9 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
ICDCIT
2005
Springer
14 years 1 months ago
Validation of Policy Integration Using Alloy
Abstract. Organizations typically have multiple security policies operating together in the same system. The integration of multiple policies might be needed to achieve the desired...
Manachai Toahchoodee, Indrakshi Ray
IRI
2006
IEEE
14 years 1 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
CL
2002
Springer
13 years 7 months ago
Security boundaries in mobile ambients
A new notion of security boundary is introduced to model multilevel security policies in the scenario of mobile systems, within Cardelli and Gordon's "pure" mobile ...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
CCS
2004
ACM
14 years 26 days ago
Security policies for downgrading
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Stephen Chong, Andrew C. Myers