Sciweavers

1401 search results - page 71 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
TRUST
2009
Springer
14 years 3 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
IEEEARES
2008
IEEE
14 years 3 months ago
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems
Emerging models for context-aware role-based access control pose challenging requirements over policy administration. In this paper we address the issues raised by the decentraliz...
Maria Luisa Damiani, Claudio Silvestri, Elisa Bert...
USENIX
2007
13 years 11 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
SOUPS
2010
ACM
14 years 23 days ago
Encountering stronger password requirements: user attitudes and behaviors
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...
MICCAI
2008
Springer
14 years 10 months ago
MRI Bone Segmentation Using Deformable Models and Shape Priors
Abstract. This paper addresses the problem of automatically segmenting bone structures in low resolution clinical MRI datasets. The novel aspect of the proposed method is the combi...
Jérôme Schmid, Nadia Magnenat-Thalman...